Quarter 4 - Quiz 3

Quarter 4 - Quiz 3

12th Grade

10 Qs

quiz-placeholder

Similar activities

PowerPoint 2013 Interface

PowerPoint 2013 Interface

11th - 12th Grade

10 Qs

Cloud Computing

Cloud Computing

9th - 12th Grade

10 Qs

Computer Fundamentals

Computer Fundamentals

12th Grade

10 Qs

BTEC L2 Unit 1 Online World 1-8

BTEC L2 Unit 1 Online World 1-8

11th - 12th Grade

15 Qs

IBA/CIW REVIEW TEST-B

IBA/CIW REVIEW TEST-B

9th - 12th Grade

15 Qs

Unit 4 004 Software Development

Unit 4 004 Software Development

12th Grade - University

11 Qs

Computer system and organization

Computer system and organization

10th - 12th Grade

15 Qs

IT English Essentials: Unit 12 - Quiz 1

IT English Essentials: Unit 12 - Quiz 1

12th Grade

10 Qs

Quarter 4 - Quiz 3

Quarter 4 - Quiz 3

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Eugene Valdoz

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Is a security technique that regulates who or what can view or use resources in a computing environment.

Access Control

Physical Access Control

Logical Access Control

Network Access Control

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A computer programmer wants to limit access to campuses, buildings, rooms and physical IT assets. What access control is required to use?

Access Control

Physical Access Control

Logical Access Control

Network Access Control

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A computer programmer wants to limit connections to computer networks, system files and data. What access control is required to use?

Access Control

Physical Access Control

Logical Access Control

Network Access Control

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

This is a security model in which access rights are regulated by a central authority based on multiple levels of security.

Mandatory access control (MAC)

Physical Access Control

Logical Access Control

Discretionary access control (DAC)

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

This is an access control method in which owners or administrators of the protected system, data or resource set the policies defining who or what is authorized to access the resource.

Mandatory access control (MAC)

Physical Access Control

Logical Access Control

Discretionary access control (DAC)

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

This is a widely used access control mechanism that restricts access to computer resources based on individuals or groups with defined business functions.

Mandatory access control (MAC)

Role-based access control (RBAC)

Rule-based access control

Discretionary access control (DAC)

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

This is a security model in which the system administrator defines the rules that govern access to resource objects.

Mandatory access control (MAC)

Role-based access control (RBAC)

Rule-based access control

Discretionary access control (DAC)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?