Search Header Logo

Lesson 22

Authored by Ciara Williams

Instructional Technology

9th - 12th Grade

Used 3+ times

Lesson 22
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes Discretionary Access Control (DAC)?

An authorization access model that has security clearance levels or compartments

An authorization access model that groups users based on administrative or job functions

An authorization access model that stresses the importance of the owner who has full control over the resource

An authorization access model in which access is based on policies that are non-discretionary

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the authorization concept known as implicit deny?

A principle stating that a user should be granted rights necessary to perform a job and nothing more

A principle stating that the owner is the central authority and has full control over assigning access to resources

A principle stating that users are grouped based on administrative or job functions and assigned a template of permissions

A principle stating that access requires explicit authorization and everything else is rejected

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A principle stating that users are only granted the permissions needed to perform a job and nothing more is called the least privilege principle.

True

False

4.

DRAG AND DROP QUESTION

1 min • 1 pt

Implicit ​ (a)   is a principle stating that unless there is a rule specifying that ​ (b)   should be granted (​ (c)   authorization), any request for access is ​ (d)   This is often seen in firewall policies.

deny
access
explicit
denied.
allow
policies
implicit
approved

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Grouping users based on administrative function and assign a template of permissions is an authorization access model called

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which non-repudiation mechanism can prove that a person was genuinely operating an account and that it was not hijacked?

A biometric authentication device

A video surveillance camera

A physical or digital signature

A token or receipt

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes Mandatory Access Control (MAC)?

An authorization access model that stresses the importance of the owner who has full control over the resource

An authorization access model that has security clearance levels or compartments

An authorization access model in which access is based on policies that are non-discretionary

An authorization access model that groups users based on administrative or job functions

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?