
ACI - Sec+ 701 MOW Review
Authored by Pat Johnson
Computers
12th Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
75 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which term does NOT represent a pillar of cybersecurity?
Authentication
Confidentiality
Availability
Integrity
Answer explanation
The term 'Authentication' does NOT represent a pillar of cybersecurity. The pillars are Confidentiality, Availability, and Integrity.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What concept establishes that the parties involved in an action or event cannot deny having been involved?
Authorization
Non-repudiation
Zero Trust
Honeypot
Answer explanation
Non-repudiation establishes that the parties involved cannot deny their participation in an action or event, ensuring accountability and trustworthiness.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which access control method is described by resource owners having the authority to grant or deny access to other users?
RBAC
ABAC
MAC
DAC
Answer explanation
The access control method described by resource owners having the authority to grant or deny access to other users is DAC (Discretionary Access Control). In DAC, users have control over their resources and can decide who can access them.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What physical access control method prevents tailgating by ensuring only one individual at a time can authenticate and be granted physical access through a barrier?
Policy Enforcement Point
Access badge
Access Control Vestibule
Control plane
Answer explanation
The physical access control method that prevents tailgating by ensuring only one individual at a time can authenticate and be granted physical access through a barrier is the Access Control Vestibule.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which security category focuses on policies, procedures, and overall management of security within an organization?
Managerial
Operational
Technical
Physical
Answer explanation
The security category that focuses on policies, procedures, and overall management of security within an organization is Managerial.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which security category is exemplified by network security, encryption, authentication mechanisms, IDSs, and firewalls?
Managerial
Physical
Technical
Operational
Answer explanation
The correct security category exemplified by network security, encryption, authentication mechanisms, IDSs, and firewalls is Technical.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization posts "No Trespassing" signs. What type of security control is this considered?
Deterrent
Detective
Preventive
Corrective
Answer explanation
The 'No Trespassing' signs act as a deterrent by warning individuals not to trespass, aiming to prevent unauthorized access to the organization's property.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?