Chapter 5(3of3)

Chapter 5(3of3)

University

10 Qs

quiz-placeholder

Similar activities

QUIZ NUMBER 2

QUIZ NUMBER 2

University

10 Qs

Database

Database

2nd Grade - University

15 Qs

social engineering

social engineering

1st Grade - Professional Development

10 Qs

CIT 111 Theory Lecture Quiz

CIT 111 Theory Lecture Quiz

University

10 Qs

Google Aptitude Test

Google Aptitude Test

KG - University

10 Qs

Linux: Users and Groups

Linux: Users and Groups

9th Grade - University

14 Qs

BIM1014 Quiz 2

BIM1014 Quiz 2

KG - University

15 Qs

Chapter 5(3of3)

Chapter 5(3of3)

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Khairul Imtiyaz

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization is implementing a security measure where security clearance levels are assigned to objects and users. Users can only access objects with a clearance level equal to or lower than their own, and these clearance levels cannot be changed by users. Which access control method aligns with this description?

Discretionary Access Control (DAC)

Attribute-Based Access Control (ABAC)

Mandatory Access Control (MAC)

Role-Based Access Control (RBAC)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In an organization where strict control over access rights is essential, which access control method assigns security clearance levels to objects and users, ensuring that users can only access objects with clearance levels equal to or lower than their own, and prevents users from altering security settings?

Attribute-Based Access Control (ABAC)

Role-Based Access Control (RBAC)

Discretionary Access Control (DAC)

Mandatory Access Control (MAC)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization is implementing an access control model where access policies are determined by system-enforced rules rather than by system users. These rules complement protections based on discretionary access control. Which access control model aligns with this description?

Rule-Based Access Control (RBAC)

Role-Based Access Control (RBAC)

Mandatory Access Control (MAC)

Discretionary Access Control (DAC)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In an organization where access policies are determined by system-enforced rules rather than by system users, which access control model is implemented to complement protections based on discretionary access control?

Discretionary Access Control (DAC)

Rule-Based Access Control (RBAC)

Mandatory Access Control (MAC)

Role-Based Access Control (RBAC)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a network environment where incoming and outgoing network traffic needs to be regulated based on predefined rules, which security solution utilizes rule-based access control?

Web Application Firewalls (WAF)

Intrusion Detection and Prevention Systems (IDPS)

Email Filtering Systems

Network Firewalls

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security solution utilizes rule-based access control to protect web applications from cyber threats such as SQL injection, cross-site scripting (XSS), and distributed denial-of-service (DDoS) attacks by inspecting HTTP requests and responses?

Intrusion Detection and Prevention Systems (IDPS)

Web Application Firewalls (WAF)

Network Firewalls

Email Filtering Systems

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which of the following scenarios is Role-Based Access Control (RBAC) commonly implemented?

Filtering incoming emails based on predefined criteria.

Detecting and preventing potential security threats within a network.

Regulating access to system resources and files in operating systems.

Analyzing network traffic patterns and comparing them against predefined rules.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers