
Access Control Independent Practice
Authored by Ciara Williams
Computers
12th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
79 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an access control system?
A set of technical controls that govern how subjects may interact with objects.
A system that manages network traffic.
A software that monitors user activity.
A hardware device that stores data.
Answer explanation
An access control system is a set of technical controls that govern how subjects may interact with objects, making it the correct choice.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT one of the four main processes of an access control system?
Identification
Authentication
Authorization
Encryption
Answer explanation
Encryption is NOT one of the four main processes of an access control system. The main processes are Identification, Authentication, and Authorization.
3.
OPEN ENDED QUESTION
3 mins • 1 pt
What does the principle of least privilege mean?
Evaluate responses using AI:
OFF
Answer explanation
The principle of least privilege means giving users only the minimum level of access or permissions needed to perform their tasks, reducing the risk of unauthorized access or misuse.
4.
OPEN ENDED QUESTION
3 mins • 1 pt
What is the principle of implicit deny?
Evaluate responses using AI:
OFF
Answer explanation
The principle of implicit deny states that unless a rule explicitly allows traffic, it is denied by default.
5.
OPEN ENDED QUESTION
3 mins • 1 pt
In the context of access control, what is an Access Control List (ACL)?
Evaluate responses using AI:
OFF
Answer explanation
An Access Control List (ACL) is a list of permissions attached to an object that specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which access control model stresses the importance of the owner and grants them full control over the resource?
Discretionary Access Control (DAC)
Role-based Access Control (RBAC)
Mandatory Access Control (MAC)
Rule-based Access Control
Answer explanation
Discretionary Access Control (DAC) stresses the importance of the owner and grants them full control over the resource, making it the correct choice.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which access control model adds an extra degree of administrative control to the DAC model by defining organizational roles?
Discretionary Access Control (DAC)
Role-based Access Control (RBAC)
Mandatory Access Control (MAC)
Rule-based Access Control
Answer explanation
Role-based Access Control (RBAC) adds an extra degree of administrative control by defining organizational roles.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?