Search Header Logo

NDE full course test

Authored by Donald Sanders

Computers

12th Grade

25 Questions

Used 2+ times

NDE full course test
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following security controls discourages entities from policy violations and sends warning signs if any policy violations are reported?

Deterrence controls

Prevention controls

Detection controls

Encryption and protocols

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following protocol employs a client–server model and provides authentication, authorization, and accounting (AAA) for remote-access servers to communicate with a central server?

SMTP

RADIUS

IPsec

HTTPS

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following terms refers to the actions performed by a user on a file or a process to change its state through the given permission?

Object

Operation

Reference monitor

Subject

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

James, a student, accessed a ticket booking portal for a flight ticket to reach his university, which is located in another state. As he does not have an account in that ticketing platform, he got a pop-up message informing him to access the website through any popular social media account credentials.

Identify the authentication method demonstrated in the above scenario.

Biometric authentication

Two-factor authentication

Single sign-on (SSO) authentication

Smart card authentication

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following authorization techniques refers to gaining access to the requested resources and obtaining permission to access the resources attached with the primary requested resource?

Implicit authorization

Centralized authorization

Explicit authorization

Decentralized authorization

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the title of the Digital Millennium Copyright Act that implements the World Intellectual Property Organization (WIPO) treaties.

Title II

Title I

Title V

Title III

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the Internet access policy that enables only safe/necessary services individually, and nonessential services/procedures that cannot be made safe are not allowed.

Paranoid policy

Promiscuous policy

Prudent policy

Permissive policy

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?