
Quiz Mod 02
Authored by Nelbert St. Clair
Professional Development, Other
University
Used 25+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Identify the access control terminology that is referred to as an explicit resource on which an access restriction is imposed.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Given below are the steps involved in the access control mechanism.<br /><br /> Once the identification is successful, the system provides the user access to use the system<br /> A user provides their credentials while logging into the system<br /> The system then allows the user to perform only those operations for which the user has been authorized<br /> The system validates the user with the database on the basis of the provided credentials<br /><br />Identify the correct sequence of steps involved in the access control mechanism.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
James, a network administrator, was assigned a task to create a standard access control model for the organization's confidential data. He implemented an access control model that determines the usage and access policies for the users. After its implementation, only users with appropriate access rights can access the resource.<br /><br />Which of the following access control models James has implemented in the above scenario?
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following access control models can be termed as need-to-know access model where the decision can be taken by an owner to provide or deny access to specific user or a group of users?
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Identify the access control model in which the access permissions are beyond the user control, which implies that users cannot amend the access policies created by the system.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Benila, a security professional, implemented cryptography-based authentication to ensure strong authentication in her organization. She employed an authentication mechanism that needs a device embedded with a small computer chip that stores personal information of the employee for identification.<br /><br />Identify the type of authentication employed by Benila in the above scenario.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Ronnie, a security professional got many tickets stating that certain miscreants have been accessing the files with the credentials of the employees and they are creating havoc in the organization. To prevent such incidents, Ronnie implemented an authentication mechanism that identifies human characteristics for authenticating people.<br /><br />Which of the following types of authentication did Ronnie implement in the above scenario?<br /><br />
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
17 questions
Ecosystem Services
Quiz
•
University
19 questions
redemption quiz in anaphy
Quiz
•
University
20 questions
UAS Dinamika Kelompok
Quiz
•
University
20 questions
THMM 2
Quiz
•
University
20 questions
Malaysian Cultural Trivia Challenge
Quiz
•
University
15 questions
Taxation - Introduction to Tax
Quiz
•
University
20 questions
Module 6: Social Groups and Organization
Quiz
•
11th Grade - Professi...
15 questions
accounting principles
Quiz
•
University
Popular Resources on Wayground
8 questions
2 Step Word Problems
Quiz
•
KG - University
20 questions
Comparing Fractions
Quiz
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Latin Bases claus(clois,clos, clud, clus) and ped
Quiz
•
6th - 8th Grade
22 questions
fractions
Quiz
•
3rd Grade
7 questions
The Story of Books
Quiz
•
6th - 8th Grade
Discover more resources for Professional Development
8 questions
2 Step Word Problems
Quiz
•
KG - University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University
7 questions
Force and Motion
Interactive video
•
4th Grade - University
10 questions
14.2 Independent/Dependent Variables
Quiz
•
KG - University
18 questions
Great Lakes States
Quiz
•
KG - University
7 questions
DNA, Chromosomes, Genes, and Traits: An Intro to Heredity
Interactive video
•
11th Grade - University
7 questions
Reflexive Verbs in Spanish
Lesson
•
9th Grade - University
7 questions
Narrative Writing 1
Interactive video
•
4th Grade - University