
NDE full course test
Authored by Donald Sanders
Computers
12th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following security controls discourages entities from policy violations and sends warning signs if any policy violations are reported?
Deterrence controls
Prevention controls
Detection controls
Encryption and protocols
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following protocol employs a client–server model and provides authentication, authorization, and accounting (AAA) for remote-access servers to communicate with a central server?
SMTP
RADIUS
IPsec
HTTPS
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following terms refers to the actions performed by a user on a file or a process to change its state through the given permission?
Object
Operation
Reference monitor
Subject
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
James, a student, accessed a ticket booking portal for a flight ticket to reach his university, which is located in another state. As he does not have an account in that ticketing platform, he got a pop-up message informing him to access the website through any popular social media account credentials.
Identify the authentication method demonstrated in the above scenario.
Biometric authentication
Two-factor authentication
Single sign-on (SSO) authentication
Smart card authentication
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following authorization techniques refers to gaining access to the requested resources and obtaining permission to access the resources attached with the primary requested resource?
Implicit authorization
Centralized authorization
Explicit authorization
Decentralized authorization
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Identify the title of the Digital Millennium Copyright Act that implements the World Intellectual Property Organization (WIPO) treaties.
Title II
Title I
Title V
Title III
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Identify the Internet access policy that enables only safe/necessary services individually, and nonessential services/procedures that cannot be made safe are not allowed.
Paranoid policy
Promiscuous policy
Prudent policy
Permissive policy
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Clean, Sanitize and Store Kitchen Tools and Equipment
Quiz
•
11th - 12th Grade
20 questions
History of Package Design
Quiz
•
9th - 12th Grade
20 questions
NP IT Quiz ปริศนาไอที #4
Quiz
•
9th - 12th Grade
20 questions
Pointers
Quiz
•
12th Grade
21 questions
Google Sheets
Quiz
•
12th Grade
20 questions
Problem Solving Quiz
Quiz
•
6th Grade - University
20 questions
Introduction to computer networks
Quiz
•
12th Grade
20 questions
Name The Disney Animation Films
Quiz
•
KG - University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade