Search Header Logo

Quiz Mod 02

Authored by Nelbert St. Clair

Professional Development, Other

University

Used 25+ times

Quiz Mod 02
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Identify the access control terminology that is referred to as an explicit resource on which an access restriction is imposed.

Object
Subject
Reference Monitor
Operation

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Given below are the steps involved in the access control mechanism.<br /><br /> Once the identification is successful, the system provides the user access to use the system<br /> A user provides their credentials while logging into the system<br /> The system then allows the user to perform only those operations for which the user has been authorized<br /> The system validates the user with the database on the basis of the provided credentials<br /><br />Identify the correct sequence of steps involved in the access control mechanism.

A. 1 -> 2 -> 3 -> 4
B. 3 -> 1 -> 2 -> 4
D. 1 -> 3 -> 4 -> 2
C. 2 -> 4 -> 1 -> 3

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

James, a network administrator, was assigned a task to create a standard access control model for the organization's confidential data. He implemented an access control model that determines the usage and access policies for the users. After its implementation, only users with appropriate access rights can access the resource.<br /><br />Which of the following access control models James has implemented in the above scenario?

MAC
RB-RBAC
RBAC
DAC

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following access control models can be termed as need-to-know access model where the decision can be taken by an owner to provide or deny access to specific user or a group of users?

Role-based access control
Rule-based access control
Mandatory access control
Discretionary Access Control

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Identify the access control model in which the access permissions are beyond the user control, which implies that users cannot amend the access policies created by the system.

Rule-based access control
Discretionary Access Control
Mandatory access control
Role-based access control

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Benila, a security professional, implemented cryptography-based authentication to ensure strong authentication in her organization. She employed an authentication mechanism that needs a device embedded with a small computer chip that stores personal information of the employee for identification.<br /><br />Identify the type of authentication employed by Benila in the above scenario.

Biometric Authentication
Password Authentication
Smart Card Authentication
SSO Authentication

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Ronnie, a security professional got many tickets stating that certain miscreants have been accessing the files with the credentials of the employees and they are creating havoc in the organization. To prevent such incidents, Ronnie implemented an authentication mechanism that identifies human characteristics for authenticating people.<br /><br />Which of the following types of authentication did Ronnie implement in the above scenario?<br /><br />

Smart Card Authentication
Biometric Authentication
Password Authentication
SSO Authentication

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?