Search Header Logo

Access Control Independent Practice

Authored by Ciara Williams

Computers

12th Grade

Access Control Independent Practice
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

79 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an access control system?

A set of technical controls that govern how subjects may interact with objects.

A system that manages network traffic.

A software that monitors user activity.

A hardware device that stores data.

Answer explanation

An access control system is a set of technical controls that govern how subjects may interact with objects, making it the correct choice.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT one of the four main processes of an access control system?

Identification

Authentication

Authorization

Encryption

Answer explanation

Encryption is NOT one of the four main processes of an access control system. The main processes are Identification, Authentication, and Authorization.

3.

OPEN ENDED QUESTION

3 mins • 1 pt

What does the principle of least privilege mean?

Evaluate responses using AI:

OFF

Answer explanation

The principle of least privilege means giving users only the minimum level of access or permissions needed to perform their tasks, reducing the risk of unauthorized access or misuse.

4.

OPEN ENDED QUESTION

3 mins • 1 pt

What is the principle of implicit deny?

Evaluate responses using AI:

OFF

Answer explanation

The principle of implicit deny states that unless a rule explicitly allows traffic, it is denied by default.

5.

OPEN ENDED QUESTION

3 mins • 1 pt

In the context of access control, what is an Access Control List (ACL)?

Evaluate responses using AI:

OFF

Answer explanation

An Access Control List (ACL) is a list of permissions attached to an object that specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access control model stresses the importance of the owner and grants them full control over the resource?

Discretionary Access Control (DAC)

Role-based Access Control (RBAC)

Mandatory Access Control (MAC)

Rule-based Access Control

Answer explanation

Discretionary Access Control (DAC) stresses the importance of the owner and grants them full control over the resource, making it the correct choice.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access control model adds an extra degree of administrative control to the DAC model by defining organizational roles?

Discretionary Access Control (DAC)

Role-based Access Control (RBAC)

Mandatory Access Control (MAC)

Rule-based Access Control

Answer explanation

Role-based Access Control (RBAC) adds an extra degree of administrative control by defining organizational roles.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?