Search Header Logo

ITF - Quiz 14.1 - Access Controls

Authored by Brock McKinley

Computers

Professional Development

Used 4+ times

ITF - Quiz 14.1 - Access Controls
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

What is access control in computer security?

A. Dictating how entities interact with resources

B. Verifying the identity of users

C. Tracking authorized and unauthorized usage of resources

D. Assigning security labels to subjects and objects

2.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

What is the purpose of identification in access control?

A. To create user accounts

B. To verify user identity

C. To determine user permissions

D. To track user activities

3.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

What is the principle of least privilege?

A. Granting excessive privileges to users

B. Granting minimum rights necessary for specific tasks

C. Granting full control over resources to the owner

D. Granting access to users within the same domain

4.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

What is the principle of implicit deny?

A. Denying access by default unless explicitly granted

B. Granting access by default unless explicitly denied

C. Denying access to users with high clearance levels

D. Granting access to users based on organizational roles

5.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

What is the role of accounting in access control?

A. Creating user accounts

B. Verifying user identity

C. Tracking user activities

D. Assigning security labels to subjects and objects

6.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

Which access control model places emphasis on the resource owner?

A. Discretionary Access Control (DAC)

B. Role-based Access Control (RBAC)

C. Mandatory Access Control (MAC)

D. Rule-based Access Control

7.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

What is the additional layer introduced by Role-based Access Control (RBAC)?

A. Administrative control

B. Security clearance levels

C. User-defined access control policies

D. Continuous authentication

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?