IAS REVIEW

IAS REVIEW

University

15 Qs

quiz-placeholder

Similar activities

International Economic Institutions

International Economic Institutions

University

20 Qs

Bitmap v Vector Images

Bitmap v Vector Images

KG - University

10 Qs

partnership -admission

partnership -admission

University

20 Qs

FIS - LIC & GIC

FIS - LIC & GIC

University

20 Qs

INTRO TO TECHDRAFT

INTRO TO TECHDRAFT

University

10 Qs

EVENT DESIGN

EVENT DESIGN

University

10 Qs

Check Music WC 22nd June Year 8

Check Music WC 22nd June Year 8

5th Grade - University

13 Qs

DISCOVERY LEARNING

DISCOVERY LEARNING

University

10 Qs

IAS REVIEW

IAS REVIEW

Assessment

Quiz

Arts

University

Practice Problem

Medium

Created by

KEN ROLLOQUE

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

The access control mechanism whereby unverified or unauthenticated entities who seek access to a resource provide a label by which they are known to the system

2.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

Ø The selective method by which systems specify who may use a particular resource and how they may use it

3.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

The access control mechanism that represents the matching of an authenticated entity to a list of information assets and corresponding access levels.

4.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

Ø The access control mechanism that requires the validation and verification of an unauthenticated entity’s purported identity.

5.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

Ø A private, secure network operated over a public and insecure network.

6.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

Ø a combination of hardware and software that filters or prevents specific information from moving between the outside network and the inside network

7.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

examines the header information of data packets that come into a network and determines whether to drop them (deny) or forward them to the next network connection (allow), based on its configuration rules.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?