ISC2 - CC - Chapter 3 - Module 3

ISC2 - CC - Chapter 3 - Module 3

Professional Development

24 Qs

quiz-placeholder

Similar activities

A+ - 19A -

A+ - 19A -

Professional Development

21 Qs

ทบทวน macOS

ทบทวน macOS

Professional Development

20 Qs

ระบบปฏิบัติการ

ระบบปฏิบัติการ

Professional Development

20 Qs

Transport Layer Group Face Off

Transport Layer Group Face Off

Professional Development

20 Qs

A+ - 15B - Identify Features of macOS

A+ - 15B - Identify Features of macOS

Professional Development

23 Qs

Apple Operating System

Apple Operating System

Professional Development

20 Qs

CISCO M1 - Physical Layer (Module 7)

CISCO M1 - Physical Layer (Module 7)

Professional Development

20 Qs

Intro to Cybersecurity - Review 1

Intro to Cybersecurity - Review 1

Professional Development

20 Qs

ISC2 - CC - Chapter 3 - Module 3

ISC2 - CC - Chapter 3 - Module 3

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Sebastian Zamorano

Used 27+ times

FREE Resource

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the definition of logical access controls?
Authentication methods that manage access to systems
Authentication methods that manage access to physical locations
Any control that involves technology
All the other answers are correct

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is access control policy?
A list of authorized users and their privileges
A list of network devices and their configurations
A set of guidelines and procedures for managing access to resources and data
A list of resources and their security requirements

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do protect logical access controls?
Physical Assets
Information
All assets
People

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following can never be considered a logical access control?
PIN number
Face pattern
Fence
USB key

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a security token?
A type of Access Control Model
A type of encryption algorithm
A physical device used to store authentication credentials
A type of biometric identifier

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do access control models allow to assign in an efficient way?
Authentication
Authorization
Non-repudiation
Accounting

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does authorization mean?
The process of verifying user's identity
The process of granting access to resources and data
The process of creating a copy of backup
The process of encrypting data

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?