Chapter 5(3of3)

Chapter 5(3of3)

University

10 Qs

quiz-placeholder

Similar activities

CID - Access COntrol

CID - Access COntrol

University

10 Qs

Quiz Pra-UTS Odd 2022/2023 - LA11 and LA26

Quiz Pra-UTS Odd 2022/2023 - LA11 and LA26

University

10 Qs

Security+

Security+

University

15 Qs

Laravel-Manajemen-User

Laravel-Manajemen-User

University

15 Qs

Introduction to database systems

Introduction to database systems

University

10 Qs

Introduction to Database

Introduction to Database

University

10 Qs

ITBP301_Chapter 08

ITBP301_Chapter 08

University

10 Qs

Chapter 3 Quiz

Chapter 3 Quiz

University

9 Qs

Chapter 5(3of3)

Chapter 5(3of3)

Assessment

Quiz

Computers

University

Hard

Created by

Khairul Imtiyaz

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization is implementing a security measure where security clearance levels are assigned to objects and users. Users can only access objects with a clearance level equal to or lower than their own, and these clearance levels cannot be changed by users. Which access control method aligns with this description?

Discretionary Access Control (DAC)

Attribute-Based Access Control (ABAC)

Mandatory Access Control (MAC)

Role-Based Access Control (RBAC)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In an organization where strict control over access rights is essential, which access control method assigns security clearance levels to objects and users, ensuring that users can only access objects with clearance levels equal to or lower than their own, and prevents users from altering security settings?

Attribute-Based Access Control (ABAC)

Role-Based Access Control (RBAC)

Discretionary Access Control (DAC)

Mandatory Access Control (MAC)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization is implementing an access control model where access policies are determined by system-enforced rules rather than by system users. These rules complement protections based on discretionary access control. Which access control model aligns with this description?

Rule-Based Access Control (RBAC)

Role-Based Access Control (RBAC)

Mandatory Access Control (MAC)

Discretionary Access Control (DAC)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In an organization where access policies are determined by system-enforced rules rather than by system users, which access control model is implemented to complement protections based on discretionary access control?

Discretionary Access Control (DAC)

Rule-Based Access Control (RBAC)

Mandatory Access Control (MAC)

Role-Based Access Control (RBAC)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a network environment where incoming and outgoing network traffic needs to be regulated based on predefined rules, which security solution utilizes rule-based access control?

Web Application Firewalls (WAF)

Intrusion Detection and Prevention Systems (IDPS)

Email Filtering Systems

Network Firewalls

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security solution utilizes rule-based access control to protect web applications from cyber threats such as SQL injection, cross-site scripting (XSS), and distributed denial-of-service (DDoS) attacks by inspecting HTTP requests and responses?

Intrusion Detection and Prevention Systems (IDPS)

Web Application Firewalls (WAF)

Network Firewalls

Email Filtering Systems

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which of the following scenarios is Role-Based Access Control (RBAC) commonly implemented?

Filtering incoming emails based on predefined criteria.

Detecting and preventing potential security threats within a network.

Regulating access to system resources and files in operating systems.

Analyzing network traffic patterns and comparing them against predefined rules.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?