Information Assurance and Security 2 Midterm Exam

Information Assurance and Security 2 Midterm Exam

University

30 Qs

quiz-placeholder

Similar activities

CIS27B Quiz 2 Review

CIS27B Quiz 2 Review

University

25 Qs

Information Assurance and Security Finals Long Test

Information Assurance and Security Finals Long Test

University

30 Qs

IT301 Final Ex 2022

IT301 Final Ex 2022

University

25 Qs

Administrasi JAringan AMIK

Administrasi JAringan AMIK

University

25 Qs

Physical and Data Link Layer MCQs

Physical and Data Link Layer MCQs

University

25 Qs

Diagnostico de Seguridad en la Nube

Diagnostico de Seguridad en la Nube

University

25 Qs

Packet Tracer Quiz

Packet Tracer Quiz

University

26 Qs

AHJN: Unit14-P1-Communication & Internet

AHJN: Unit14-P1-Communication & Internet

12th Grade - University

25 Qs

Information Assurance and Security 2 Midterm Exam

Information Assurance and Security 2 Midterm Exam

Assessment

Quiz

Computers

University

Medium

Created by

John Santos

Used 13+ times

FREE Resource

30 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What do you call the method by which systems determine whether and how to admit a user into trusted area of the organization?

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

It is a fundamental concept in security that minimizes risk to the business or organization.

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

It provides the ability to share resources in a peer-to-peer configuration that allows users to control and possibly provide access to information or resources at their disposal.

Mandatory Access Control (MAC)

Non-Discretionary Controls

Discretionary Access Controls (DAC)

None of the choices

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

It is a mechanism where unverified or unauthenticated entities who seek access to a resource provide a label by which they are known to the system.

Identification

Authentication

Authorization

Accountability

None of the choices

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What do you call the process of validation an unauthenticated entity's purported identity?

Identification

Authentication

Authorization

Accountability

None of the choices

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

This type of control is associated with the duties a user performs in an organization, such as a position or temporary assignment.

Mandatory access control

Role-based access controls

Task-based access controls

Discretionary access controls

None of the choices

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

It is a person who maintains the security of a system, perhaps by adding and removing access by user accounts

Owner

Custodian

End user

Subjects

None of the choices

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?