
Quiz Mod 02
Authored by Nelbert St. Clair
Professional Development, Other
University
Used 25+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Identify the access control terminology that is referred to as an explicit resource on which an access restriction is imposed.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Given below are the steps involved in the access control mechanism.<br /><br /> Once the identification is successful, the system provides the user access to use the system<br /> A user provides their credentials while logging into the system<br /> The system then allows the user to perform only those operations for which the user has been authorized<br /> The system validates the user with the database on the basis of the provided credentials<br /><br />Identify the correct sequence of steps involved in the access control mechanism.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
James, a network administrator, was assigned a task to create a standard access control model for the organization's confidential data. He implemented an access control model that determines the usage and access policies for the users. After its implementation, only users with appropriate access rights can access the resource.<br /><br />Which of the following access control models James has implemented in the above scenario?
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following access control models can be termed as need-to-know access model where the decision can be taken by an owner to provide or deny access to specific user or a group of users?
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Identify the access control model in which the access permissions are beyond the user control, which implies that users cannot amend the access policies created by the system.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Benila, a security professional, implemented cryptography-based authentication to ensure strong authentication in her organization. She employed an authentication mechanism that needs a device embedded with a small computer chip that stores personal information of the employee for identification.<br /><br />Identify the type of authentication employed by Benila in the above scenario.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Ronnie, a security professional got many tickets stating that certain miscreants have been accessing the files with the credentials of the employees and they are creating havoc in the organization. To prevent such incidents, Ronnie implemented an authentication mechanism that identifies human characteristics for authenticating people.<br /><br />Which of the following types of authentication did Ronnie implement in the above scenario?<br /><br />
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
17 questions
Questionnaire Design
Quiz
•
University
22 questions
Guess The Rapper?
Quiz
•
7th Grade - Professio...
20 questions
Module 8: State and Non-state Institutions
Quiz
•
11th Grade - University
20 questions
Planning lessons
Quiz
•
University
20 questions
CB CHAPTER 8 Pay for Performance Plans
Quiz
•
University
15 questions
Science Report 1 - Summary
Quiz
•
University
20 questions
INTRODUCCION WORD OFIMATICA I
Quiz
•
University
15 questions
Pronouns Quiz
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for Professional Development
7 questions
How James Brown Invented Funk
Interactive video
•
10th Grade - University
5 questions
Helping Build the Internet: Valerie Thomas | Great Minds
Interactive video
•
11th Grade - University
12 questions
IREAD Week 4 - Review
Quiz
•
3rd Grade - University
23 questions
Subject Verb Agreement
Quiz
•
9th Grade - University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
19 questions
Review2-TEACHER
Quiz
•
University
15 questions
Pre2_STUDENT
Quiz
•
University
20 questions
Ch. 7 Quadrilateral Quiz Review
Quiz
•
KG - University