
Chapter 4.2 CNS

Quiz
•
Computers
•
10th Grade
•
Hard
Nurul Rahman
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is access control and how does it protect a network?
Access control is a protocol that encrypts data transmitted over a network.
Access control is a physical barrier that prevents unauthorized access to a network.
Access control is a software that scans and removes viruses from a network.
Access control is a security measure that regulates who can access and use resources in a network. It protects a network by enforcing authentication, authorization, and accounting mechanisms to ensure that only authorized users can access the network and its resources.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Explain the concept of access control policies.
Access control policies determine the speed of internet connection.
Access control policies are a set of guidelines for managing passwords.
Access control policies are a set of rules or guidelines that determine what actions or operations a user or entity can perform on a system or resource.
Access control policies are used to restrict access to physical locations.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of AAA in controlling network access?
AAA is used for encrypting network traffic.
AAA is a protocol for routing network traffic.
AAA is a hardware device for network access control.
AAA provides a framework for managing user access to network resources.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Name three types of access control methods.
ACL, PAM, CAPTCHA
RBAC, DAC, MAC
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is role-based access control and how does it work?
RBAC is a method of allowing network access based on user location and IP address.
RBAC is a method of controlling network access based on user's social media activity.
RBAC is a method of restricting network access based on user roles and permissions.
RBAC is a method of granting network access based on user roles and permissions.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Describe discretionary access control and its advantages.
Discretionary access control (DAC) is a security model where the owner of an object has no control over who can access that object.
Discretionary access control (DAC) is a security model where the owner of an object has limited control over who can access that object.
Discretionary access control (DAC) is a security model where the owner of an object has control over who can access that object but not what actions they can perform on it.
Discretionary access control (DAC) is a security model where the owner of an object has full control over who can access that object and what actions they can perform on it. The advantages of DAC include flexibility and simplicity.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is mandatory access control and how does it differ from discretionary access control?
Mandatory access control (MAC) is a security model that enforces access permissions based on user credentials, while discretionary access control (DAC) allows the system administrator to determine access permissions.
Mandatory access control (MAC) is a security model that enforces access permissions based on user roles, while discretionary access control (DAC) allows the owner to determine access permissions.
Mandatory access control (MAC) is a security model that enforces access permissions based on user preferences, while discretionary access control (DAC) allows the system administrator to determine access permissions.
Mandatory access control (MAC) is a security model that enforces access permissions based on predefined rules, while discretionary access control (DAC) allows the owner to determine access permissions.
Create a free account and access millions of resources
Similar Resources on Wayground
11 questions
MS WORD PARTS

Quiz
•
10th Grade
17 questions
Cybersecurity & Intellectual Property Review

Quiz
•
9th - 12th Grade
10 questions
Unit 10 AP CSP Advanced

Quiz
•
9th - 12th Grade
20 questions
Ethical, Legal and Social Issues of Computing

Quiz
•
9th - 11th Grade
15 questions
Understanding the CIA Triad in Cybersecurity

Quiz
•
10th Grade
20 questions
Network Issues and Communication

Quiz
•
10th Grade
13 questions
definition for AP CSP

Quiz
•
10th - 12th Grade
14 questions
Networks & Effects

Quiz
•
10th Grade
Popular Resources on Wayground
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
20 questions
PBIS-HGMS

Quiz
•
6th - 8th Grade
10 questions
"LAST STOP ON MARKET STREET" Vocabulary Quiz

Quiz
•
3rd Grade
19 questions
Fractions to Decimals and Decimals to Fractions

Quiz
•
6th Grade
16 questions
Logic and Venn Diagrams

Quiz
•
12th Grade
15 questions
Compare and Order Decimals

Quiz
•
4th - 5th Grade
20 questions
Simplifying Fractions

Quiz
•
6th Grade
20 questions
Multiplication facts 1-12

Quiz
•
2nd - 3rd Grade