Access Controls Quiz

Access Controls Quiz

University

71 Qs

quiz-placeholder

Similar activities

S3 Computer Systems Unit 2 Assessment

S3 Computer Systems Unit 2 Assessment

7th Grade - University

70 Qs

ID and Access Management

ID and Access Management

10th Grade - University

70 Qs

Information Assurance and Security 1

Information Assurance and Security 1

University

75 Qs

DIT Unit 4 Study Guide

DIT Unit 4 Study Guide

6th Grade - University

76 Qs

Java

Java

University

69 Qs

CompTIA 1102

CompTIA 1102

University

68 Qs

Google Certified Educator (Level 1)

Google Certified Educator (Level 1)

KG - University

73 Qs

MUITICT_12_test

MUITICT_12_test

University

71 Qs

Access Controls Quiz

Access Controls Quiz

Assessment

Quiz

Computers

University

Easy

Created by

SNap_Earth SNap_Earth

Used 2+ times

FREE Resource

71 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Involves limiting what objects can be available to what subjects according to what rules

Access Control

Subjects

Rule

Object

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Any entity that requests access to our assets

Example: A ___ is the initiator of a request for service; therefore, a ___ is referred to as "active".

Subjects

Object

Rule

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A device, process, person, user, program, server; client or other entity that responds to a request for service.

Example: An ___ has an owner, and the owner has the right to determine who or what should be allowed access to their ___.

Object

Rule

Subject

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An instruction developed to allow or deny access to an object by comparing the validated identity of the subject to an access control list.

Example: When a user (subject) attempts to access a file (object), a ___ validated the level of access, if any, the user should have to that file.

Rule

Object

Subject

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Access is based on three elements:

Subject

Object

Rule

Badge Systems and Gate Entry

Environment Design

Biometrics

Natural Surveillance

Natural Access Control

Natural Territory Reinforcement

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Describes an information security strategy that integrates people, technology and operations capabilities to establish variable barriers across multiple layers and missions of the organization.

Defense in Depth

The Principle of Least Privilege (NIST SP 800-179)

Privileged Access Management

Privileged Accounts

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Is a standard of permitting only minimum access necessary for users or programs to fulfill their function

The Principle of Least Privilege (NIST SP 800-179)

Privileged Access Management

Privileged Accounts

Segregation of Duties

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?