Quarter 4 - Quiz 3

Quarter 4 - Quiz 3

12th Grade

10 Qs

quiz-placeholder

Similar activities

Attacks Threats & Vulnerabilities (C1)

Attacks Threats & Vulnerabilities (C1)

9th - 12th Grade

15 Qs

Technical Terms - Hardware (A-Z) - DAC

Technical Terms - Hardware (A-Z) - DAC

12th Grade

10 Qs

Database Recovery and Security Essentials

Database Recovery and Security Essentials

12th Grade

15 Qs

08IA Quiz

08IA Quiz

12th Grade

10 Qs

Microprocessors

Microprocessors

6th - 12th Grade

11 Qs

Cloud computing & cloud storage

Cloud computing & cloud storage

11th - 12th Grade

13 Qs

Countermeasures Against Cyberattacks

Countermeasures Against Cyberattacks

12th Grade

15 Qs

InfoSec: Access Control Methods

InfoSec: Access Control Methods

10th Grade - University

10 Qs

Quarter 4 - Quiz 3

Quarter 4 - Quiz 3

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Eugene Valdoz

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Is a security technique that regulates who or what can view or use resources in a computing environment.

Access Control

Physical Access Control

Logical Access Control

Network Access Control

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A computer programmer wants to limit access to campuses, buildings, rooms and physical IT assets. What access control is required to use?

Access Control

Physical Access Control

Logical Access Control

Network Access Control

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A computer programmer wants to limit connections to computer networks, system files and data. What access control is required to use?

Access Control

Physical Access Control

Logical Access Control

Network Access Control

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

This is a security model in which access rights are regulated by a central authority based on multiple levels of security.

Mandatory access control (MAC)

Physical Access Control

Logical Access Control

Discretionary access control (DAC)

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

This is an access control method in which owners or administrators of the protected system, data or resource set the policies defining who or what is authorized to access the resource.

Mandatory access control (MAC)

Physical Access Control

Logical Access Control

Discretionary access control (DAC)

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

This is a widely used access control mechanism that restricts access to computer resources based on individuals or groups with defined business functions.

Mandatory access control (MAC)

Role-based access control (RBAC)

Rule-based access control

Discretionary access control (DAC)

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

This is a security model in which the system administrator defines the rules that govern access to resource objects.

Mandatory access control (MAC)

Role-based access control (RBAC)

Rule-based access control

Discretionary access control (DAC)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?