Information Assurance and Security 2 Midterm Exam

Information Assurance and Security 2 Midterm Exam

University

30 Qs

quiz-placeholder

Similar activities

 Wi-Fi Security

Wi-Fi Security

University

27 Qs

Routing and Switching Essentials pra UAS

Routing and Switching Essentials pra UAS

University

25 Qs

Resiliency and Site Security

Resiliency and Site Security

9th Grade - University

25 Qs

Firewall Knowledge Quiz

Firewall Knowledge Quiz

University

25 Qs

Computer Networks - IA 1 - 18MCA24

Computer Networks - IA 1 - 18MCA24

University

25 Qs

Systems Administration Final Exam

Systems Administration Final Exam

University

30 Qs

IT Infra

IT Infra

University

30 Qs

IFT 303 Quiz one

IFT 303 Quiz one

University

25 Qs

Information Assurance and Security 2 Midterm Exam

Information Assurance and Security 2 Midterm Exam

Assessment

Quiz

Computers

University

Medium

Created by

John Santos

Used 13+ times

FREE Resource

30 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What do you call the method by which systems determine whether and how to admit a user into trusted area of the organization?

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

It is a fundamental concept in security that minimizes risk to the business or organization.

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

It provides the ability to share resources in a peer-to-peer configuration that allows users to control and possibly provide access to information or resources at their disposal.

Mandatory Access Control (MAC)

Non-Discretionary Controls

Discretionary Access Controls (DAC)

None of the choices

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

It is a mechanism where unverified or unauthenticated entities who seek access to a resource provide a label by which they are known to the system.

Identification

Authentication

Authorization

Accountability

None of the choices

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What do you call the process of validation an unauthenticated entity's purported identity?

Identification

Authentication

Authorization

Accountability

None of the choices

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

This type of control is associated with the duties a user performs in an organization, such as a position or temporary assignment.

Mandatory access control

Role-based access controls

Task-based access controls

Discretionary access controls

None of the choices

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

It is a person who maintains the security of a system, perhaps by adding and removing access by user accounts

Owner

Custodian

End user

Subjects

None of the choices

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?