Chapter 4.2 CNS

Chapter 4.2 CNS

10th Grade

15 Qs

quiz-placeholder

Similar activities

QUIZ BAB 4: SISTEM OPERASI

QUIZ BAB 4: SISTEM OPERASI

8th Grade - University

20 Qs

Threats to Data

Threats to Data

9th - 12th Grade

11 Qs

Scratch

Scratch

9th - 10th Grade

19 Qs

Quiz 1

Quiz 1

1st - 12th Grade

15 Qs

Data Security Worksheet

Data Security Worksheet

10th Grade - University

15 Qs

Excel Overview

Excel Overview

9th - 12th Grade

10 Qs

computer security

computer security

KG - 12th Grade

12 Qs

Chapter 4.2 CNS

Chapter 4.2 CNS

Assessment

Quiz

Computers

10th Grade

Practice Problem

Hard

Created by

Nurul Rahman

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is access control and how does it protect a network?

Access control is a protocol that encrypts data transmitted over a network.

Access control is a physical barrier that prevents unauthorized access to a network.

Access control is a software that scans and removes viruses from a network.

Access control is a security measure that regulates who can access and use resources in a network. It protects a network by enforcing authentication, authorization, and accounting mechanisms to ensure that only authorized users can access the network and its resources.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Explain the concept of access control policies.

Access control policies determine the speed of internet connection.

Access control policies are a set of guidelines for managing passwords.

Access control policies are a set of rules or guidelines that determine what actions or operations a user or entity can perform on a system or resource.

Access control policies are used to restrict access to physical locations.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of AAA in controlling network access?

AAA is used for encrypting network traffic.

AAA is a protocol for routing network traffic.

AAA is a hardware device for network access control.

AAA provides a framework for managing user access to network resources.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Name three types of access control methods.

ACL, PAM, CAPTCHA

RBAC, DAC, MAC

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is role-based access control and how does it work?

RBAC is a method of allowing network access based on user location and IP address.

RBAC is a method of controlling network access based on user's social media activity.

RBAC is a method of restricting network access based on user roles and permissions.

RBAC is a method of granting network access based on user roles and permissions.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Describe discretionary access control and its advantages.

Discretionary access control (DAC) is a security model where the owner of an object has no control over who can access that object.

Discretionary access control (DAC) is a security model where the owner of an object has limited control over who can access that object.

Discretionary access control (DAC) is a security model where the owner of an object has control over who can access that object but not what actions they can perform on it.

Discretionary access control (DAC) is a security model where the owner of an object has full control over who can access that object and what actions they can perform on it. The advantages of DAC include flexibility and simplicity.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is mandatory access control and how does it differ from discretionary access control?

Mandatory access control (MAC) is a security model that enforces access permissions based on user credentials, while discretionary access control (DAC) allows the system administrator to determine access permissions.

Mandatory access control (MAC) is a security model that enforces access permissions based on user roles, while discretionary access control (DAC) allows the owner to determine access permissions.

Mandatory access control (MAC) is a security model that enforces access permissions based on user preferences, while discretionary access control (DAC) allows the system administrator to determine access permissions.

Mandatory access control (MAC) is a security model that enforces access permissions based on predefined rules, while discretionary access control (DAC) allows the owner to determine access permissions.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?