Chapter 4.2 CNS

Chapter 4.2 CNS

10th Grade

15 Qs

quiz-placeholder

Similar activities

Securing Windows

Securing Windows

9th Grade - University

10 Qs

Understanding the CIA Triad in Cybersecurity

Understanding the CIA Triad in Cybersecurity

10th Grade

15 Qs

OCR GCSE CS MCQs 2.3 Defensive Design

OCR GCSE CS MCQs 2.3 Defensive Design

10th - 11th Grade

20 Qs

Attacks Threats & Vulnerabilities (C1)

Attacks Threats & Vulnerabilities (C1)

9th - 12th Grade

15 Qs

4.8 Remote Access

4.8 Remote Access

9th - 12th Grade

15 Qs

AP Computer Science Principles - Unit 10: Cybersecurity

AP Computer Science Principles - Unit 10: Cybersecurity

9th - 12th Grade

10 Qs

98-366 Lesson 6 Networking Services

98-366 Lesson 6 Networking Services

10th Grade - University

19 Qs

Ethical, Legal and Social Issues of Computing

Ethical, Legal and Social Issues of Computing

9th - 11th Grade

20 Qs

Chapter 4.2 CNS

Chapter 4.2 CNS

Assessment

Quiz

Computers

10th Grade

Hard

Created by

Nurul Rahman

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is access control and how does it protect a network?

Access control is a protocol that encrypts data transmitted over a network.

Access control is a physical barrier that prevents unauthorized access to a network.

Access control is a software that scans and removes viruses from a network.

Access control is a security measure that regulates who can access and use resources in a network. It protects a network by enforcing authentication, authorization, and accounting mechanisms to ensure that only authorized users can access the network and its resources.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Explain the concept of access control policies.

Access control policies determine the speed of internet connection.

Access control policies are a set of guidelines for managing passwords.

Access control policies are a set of rules or guidelines that determine what actions or operations a user or entity can perform on a system or resource.

Access control policies are used to restrict access to physical locations.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of AAA in controlling network access?

AAA is used for encrypting network traffic.

AAA is a protocol for routing network traffic.

AAA is a hardware device for network access control.

AAA provides a framework for managing user access to network resources.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Name three types of access control methods.

ACL, PAM, CAPTCHA

RBAC, DAC, MAC

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is role-based access control and how does it work?

RBAC is a method of allowing network access based on user location and IP address.

RBAC is a method of controlling network access based on user's social media activity.

RBAC is a method of restricting network access based on user roles and permissions.

RBAC is a method of granting network access based on user roles and permissions.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Describe discretionary access control and its advantages.

Discretionary access control (DAC) is a security model where the owner of an object has no control over who can access that object.

Discretionary access control (DAC) is a security model where the owner of an object has limited control over who can access that object.

Discretionary access control (DAC) is a security model where the owner of an object has control over who can access that object but not what actions they can perform on it.

Discretionary access control (DAC) is a security model where the owner of an object has full control over who can access that object and what actions they can perform on it. The advantages of DAC include flexibility and simplicity.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is mandatory access control and how does it differ from discretionary access control?

Mandatory access control (MAC) is a security model that enforces access permissions based on user credentials, while discretionary access control (DAC) allows the system administrator to determine access permissions.

Mandatory access control (MAC) is a security model that enforces access permissions based on user roles, while discretionary access control (DAC) allows the owner to determine access permissions.

Mandatory access control (MAC) is a security model that enforces access permissions based on user preferences, while discretionary access control (DAC) allows the system administrator to determine access permissions.

Mandatory access control (MAC) is a security model that enforces access permissions based on predefined rules, while discretionary access control (DAC) allows the owner to determine access permissions.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?