
Chapter 5(3of3)
Quiz
•
Computers
•
University
•
Practice Problem
•
Hard
Khairul Imtiyaz
Used 2+ times
FREE Resource
Enhance your content in a minute
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization is implementing a security measure where security clearance levels are assigned to objects and users. Users can only access objects with a clearance level equal to or lower than their own, and these clearance levels cannot be changed by users. Which access control method aligns with this description?
Discretionary Access Control (DAC)
Attribute-Based Access Control (ABAC)
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In an organization where strict control over access rights is essential, which access control method assigns security clearance levels to objects and users, ensuring that users can only access objects with clearance levels equal to or lower than their own, and prevents users from altering security settings?
Attribute-Based Access Control (ABAC)
Role-Based Access Control (RBAC)
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization is implementing an access control model where access policies are determined by system-enforced rules rather than by system users. These rules complement protections based on discretionary access control. Which access control model aligns with this description?
Rule-Based Access Control (RBAC)
Role-Based Access Control (RBAC)
Mandatory Access Control (MAC)
Discretionary Access Control (DAC)
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In an organization where access policies are determined by system-enforced rules rather than by system users, which access control model is implemented to complement protections based on discretionary access control?
Discretionary Access Control (DAC)
Rule-Based Access Control (RBAC)
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a network environment where incoming and outgoing network traffic needs to be regulated based on predefined rules, which security solution utilizes rule-based access control?
Web Application Firewalls (WAF)
Intrusion Detection and Prevention Systems (IDPS)
Email Filtering Systems
Network Firewalls
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which security solution utilizes rule-based access control to protect web applications from cyber threats such as SQL injection, cross-site scripting (XSS), and distributed denial-of-service (DDoS) attacks by inspecting HTTP requests and responses?
Intrusion Detection and Prevention Systems (IDPS)
Web Application Firewalls (WAF)
Network Firewalls
Email Filtering Systems
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In which of the following scenarios is Role-Based Access Control (RBAC) commonly implemented?
Filtering incoming emails based on predefined criteria.
Detecting and preventing potential security threats within a network.
Regulating access to system resources and files in operating systems.
Analyzing network traffic patterns and comparing them against predefined rules.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
Human Computer Interaction (HCI)
Quiz
•
University
10 questions
JSPS Competition Hackathon - Scratch Language - Grade 1
Quiz
•
2nd Grade - University
10 questions
Microcontroller
Quiz
•
11th Grade - University
10 questions
CSE205-DCN-QUIZ-UNIT-5
Quiz
•
University
15 questions
Assessment 08
Quiz
•
University
10 questions
Bases de datos
Quiz
•
University
12 questions
ICT450-TOPIC 1
Quiz
•
University
7 questions
Fundamental of Information Systems
Quiz
•
University
Popular Resources on Wayground
8 questions
2 Step Word Problems
Quiz
•
KG - University
20 questions
Comparing Fractions
Quiz
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Latin Bases claus(clois,clos, clud, clus) and ped
Quiz
•
6th - 8th Grade
22 questions
fractions
Quiz
•
3rd Grade
7 questions
The Story of Books
Quiz
•
6th - 8th Grade
Discover more resources for Computers
8 questions
2 Step Word Problems
Quiz
•
KG - University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University
7 questions
Force and Motion
Interactive video
•
4th Grade - University
10 questions
14.2 Independent/Dependent Variables
Quiz
•
KG - University
18 questions
Great Lakes States
Quiz
•
KG - University
7 questions
DNA, Chromosomes, Genes, and Traits: An Intro to Heredity
Interactive video
•
11th Grade - University
7 questions
Reflexive Verbs in Spanish
Lesson
•
9th Grade - University
7 questions
Narrative Writing 1
Interactive video
•
4th Grade - University
