Module 5 Unit 3 Using Access Controls Test

Module 5 Unit 3 Using Access Controls Test

9th - 12th Grade

42 Qs

quiz-placeholder

Similar activities

Latihan ASTS Informatika IX 2025

Latihan ASTS Informatika IX 2025

9th Grade

40 Qs

Y9 Computing Test - Phase 1

Y9 Computing Test - Phase 1

8th - 11th Grade

40 Qs

SIMULASI DIGITAL - X

SIMULASI DIGITAL - X

KG - Professional Development

40 Qs

PHOTOPEA-TEST-2023-S2ACC

PHOTOPEA-TEST-2023-S2ACC

12th Grade

46 Qs

LATIHAN SOAL UNBK

LATIHAN SOAL UNBK

12th Grade

40 Qs

98-368 Mobility and Devices Fundamentals Study Guide

98-368 Mobility and Devices Fundamentals Study Guide

9th - 12th Grade

40 Qs

SOAL PAS 2018 - Teknik Mikroprosessor & Mikrokontroller XD TEI

SOAL PAS 2018 - Teknik Mikroprosessor & Mikrokontroller XD TEI

10th Grade

40 Qs

PowerPoint  2016

PowerPoint 2016

7th Grade - University

40 Qs

Module 5 Unit 3 Using Access Controls Test

Module 5 Unit 3 Using Access Controls Test

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Medium

Created by

Amanda Mcnair

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

42 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

____________________ are where an intruder is misidentified as a valid user or one user is mistaken for another and __________________ are where a valid user is refused access.

False positives, false negatives
True negatives, false positives
False positives, true negatives
False negatives, false positives

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Users should only be granted the minimum sufficient permissions. What system policy ensures that users do not receive rights unless granted explicitly?

Implicit deny
Brute force
Cleartext credentials
Certificate Authority

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

__________________ are users or software processes or anything else that can request and be granted access to a resource while ________________ are the resources like networks, servers, databases, files, and so on.

Subjects, objects
Objects, subjects
Accesses, subjects
Accesses, objects

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What type of control prevents a user from denying they performed an action?

Non-repudiation
Multifactor Authentication
Public Key Infrastructure
Encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which is NOT an authentication technology category (factor)?

Something you can
Something you have
Something you are
Something you know

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

How does a one-time password work?

The password is generated by an asymmetric encryption algorithm.
The password is generated by a symmetric encryption algorithm.

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Media Image

What is the name of the password cracker in the picture?

Cain and Abel
Cain and Saul
Paul and Abel
Saul and Paul

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?