NDE full course test

NDE full course test

12th Grade

25 Qs

quiz-placeholder

Similar activities

Latihan Soal Administrasi Infrastruktur Jaringan XII TKJ

Latihan Soal Administrasi Infrastruktur Jaringan XII TKJ

10th - 12th Grade

20 Qs

Quiz on Excel

Quiz on Excel

12th Grade

20 Qs

UH 1 Teknologi wan

UH 1 Teknologi wan

12th Grade

20 Qs

Database&Relation

Database&Relation

12th Grade

20 Qs

Data structure test1

Data structure test1

12th Grade

20 Qs

NDE full course test

NDE full course test

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Donald Sanders

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following security controls discourages entities from policy violations and sends warning signs if any policy violations are reported?

Deterrence controls

Prevention controls

Detection controls

Encryption and protocols

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following protocol employs a client–server model and provides authentication, authorization, and accounting (AAA) for remote-access servers to communicate with a central server?

SMTP

RADIUS

IPsec

HTTPS

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following terms refers to the actions performed by a user on a file or a process to change its state through the given permission?

Object

Operation

Reference monitor

Subject

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

James, a student, accessed a ticket booking portal for a flight ticket to reach his university, which is located in another state. As he does not have an account in that ticketing platform, he got a pop-up message informing him to access the website through any popular social media account credentials.

Identify the authentication method demonstrated in the above scenario.

Biometric authentication

Two-factor authentication

Single sign-on (SSO) authentication

Smart card authentication

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following authorization techniques refers to gaining access to the requested resources and obtaining permission to access the resources attached with the primary requested resource?

Implicit authorization

Centralized authorization

Explicit authorization

Decentralized authorization

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the title of the Digital Millennium Copyright Act that implements the World Intellectual Property Organization (WIPO) treaties.

Title II

Title I

Title V

Title III

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the Internet access policy that enables only safe/necessary services individually, and nonessential services/procedures that cannot be made safe are not allowed.

Paranoid policy

Promiscuous policy

Prudent policy

Permissive policy

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?