
IAS Access Control Strategies
Authored by Loudel Manaloto
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
28 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of security control?
Web browser
Network cable
Firewall
Computer mouse
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the definition of an object in the context of access controls?
A device with onboard firmware
Anything that initiates a request for service
Something that contains its own access control logic
An entity that responds to a request for service
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Derrick logs on to a system to read a file.
In this example, Derrick is the ______.
Process
Object
Predicate
Subject
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a subject?
User
Fence
Filename
File
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the strategy that integrates people, technology, and operations capabilities to establish variable barriers across multiple layers and missions of an organization?
Multi-Factor Authentication
Single Point of Failure
Cyberattack Prevention
Layered Defense
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In what type of environment does role-based access control work well?
Single personnel with unique access requirements
High-staff turnover and similar access requirements
Limited access requirements for all personnel
Low-staff turnover
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of a logical access control method?
Security guards
Biometrics on a smartphone
Cameras
Turnstiles
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?