
Quarter 4 - Quiz 3
Authored by Eugene Valdoz
Computers
12th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Is a security technique that regulates who or what can view or use resources in a computing environment.
Access Control
Physical Access Control
Logical Access Control
Network Access Control
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A computer programmer wants to limit access to campuses, buildings, rooms and physical IT assets. What access control is required to use?
Access Control
Physical Access Control
Logical Access Control
Network Access Control
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A computer programmer wants to limit connections to computer networks, system files and data. What access control is required to use?
Access Control
Physical Access Control
Logical Access Control
Network Access Control
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
This is a security model in which access rights are regulated by a central authority based on multiple levels of security.
Mandatory access control (MAC)
Physical Access Control
Logical Access Control
Discretionary access control (DAC)
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
This is an access control method in which owners or administrators of the protected system, data or resource set the policies defining who or what is authorized to access the resource.
Mandatory access control (MAC)
Physical Access Control
Logical Access Control
Discretionary access control (DAC)
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
This is a widely used access control mechanism that restricts access to computer resources based on individuals or groups with defined business functions.
Mandatory access control (MAC)
Role-based access control (RBAC)
Rule-based access control
Discretionary access control (DAC)
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
This is a security model in which the system administrator defines the rules that govern access to resource objects.
Mandatory access control (MAC)
Role-based access control (RBAC)
Rule-based access control
Discretionary access control (DAC)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
Data Security Worksheet
Quiz
•
10th Grade - University
10 questions
2025 python class first quiz
Quiz
•
9th Grade - University
10 questions
COMPUTACIÓN II
Quiz
•
12th Grade
10 questions
3ero Informática PBD
Quiz
•
12th Grade
11 questions
Threats to Data
Quiz
•
9th - 12th Grade
15 questions
1.1.1 The structure and function of the processor
Quiz
•
11th Grade - University
10 questions
Control y Robótica
Quiz
•
12th Grade
15 questions
Quiz 1
Quiz
•
1st - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade