ITF - Quiz 14.1 - Access Controls

ITF - Quiz 14.1 - Access Controls

Professional Development

14 Qs

quiz-placeholder

Similar activities

GRC Overview

GRC Overview

Professional Development

10 Qs

Securing Source Code

Securing Source Code

Professional Development

10 Qs

Access Control

Access Control

Professional Development

11 Qs

IT General Control

IT General Control

Professional Development

10 Qs

Sec+ CH.2 Review Test

Sec+ CH.2 Review Test

Professional Development

15 Qs

Windows Active Directory

Windows Active Directory

University - Professional Development

19 Qs

Security+ Lesson 8

Security+ Lesson 8

Professional Development

10 Qs

Network Fundamentals-Data Link Layer

Network Fundamentals-Data Link Layer

9th Grade - Professional Development

11 Qs

ITF - Quiz 14.1 - Access Controls

ITF - Quiz 14.1 - Access Controls

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Brock McKinley

Used 4+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

What is access control in computer security?

A. Dictating how entities interact with resources

B. Verifying the identity of users

C. Tracking authorized and unauthorized usage of resources

D. Assigning security labels to subjects and objects

2.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

What is the purpose of identification in access control?

A. To create user accounts

B. To verify user identity

C. To determine user permissions

D. To track user activities

3.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

What is the principle of least privilege?

A. Granting excessive privileges to users

B. Granting minimum rights necessary for specific tasks

C. Granting full control over resources to the owner

D. Granting access to users within the same domain

4.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

What is the principle of implicit deny?

A. Denying access by default unless explicitly granted

B. Granting access by default unless explicitly denied

C. Denying access to users with high clearance levels

D. Granting access to users based on organizational roles

5.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

What is the role of accounting in access control?

A. Creating user accounts

B. Verifying user identity

C. Tracking user activities

D. Assigning security labels to subjects and objects

6.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

Which access control model places emphasis on the resource owner?

A. Discretionary Access Control (DAC)

B. Role-based Access Control (RBAC)

C. Mandatory Access Control (MAC)

D. Rule-based Access Control

7.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

What is the additional layer introduced by Role-based Access Control (RBAC)?

A. Administrative control

B. Security clearance levels

C. User-defined access control policies

D. Continuous authentication

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?