Search Header Logo

Quarter 4 - Quiz 3

Authored by Eugene Valdoz

Computers

12th Grade

Used 2+ times

Quarter 4 - Quiz 3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Is a security technique that regulates who or what can view or use resources in a computing environment.

Access Control

Physical Access Control

Logical Access Control

Network Access Control

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A computer programmer wants to limit access to campuses, buildings, rooms and physical IT assets. What access control is required to use?

Access Control

Physical Access Control

Logical Access Control

Network Access Control

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A computer programmer wants to limit connections to computer networks, system files and data. What access control is required to use?

Access Control

Physical Access Control

Logical Access Control

Network Access Control

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

This is a security model in which access rights are regulated by a central authority based on multiple levels of security.

Mandatory access control (MAC)

Physical Access Control

Logical Access Control

Discretionary access control (DAC)

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

This is an access control method in which owners or administrators of the protected system, data or resource set the policies defining who or what is authorized to access the resource.

Mandatory access control (MAC)

Physical Access Control

Logical Access Control

Discretionary access control (DAC)

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

This is a widely used access control mechanism that restricts access to computer resources based on individuals or groups with defined business functions.

Mandatory access control (MAC)

Role-based access control (RBAC)

Rule-based access control

Discretionary access control (DAC)

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

This is a security model in which the system administrator defines the rules that govern access to resource objects.

Mandatory access control (MAC)

Role-based access control (RBAC)

Rule-based access control

Discretionary access control (DAC)

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?