
ACI Sec+ Midweek

Quiz
•
Computers
•
12th Grade
•
Hard
Pat Johnson
FREE Resource
75 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which term does NOT represent a pillar of cybersecurity?
Authentication
Confidentiality
Availability
Integrity
Answer explanation
The term 'Confidentiality' does NOT represent a pillar of cybersecurity. The pillars are Authentication, Availability, and Integrity.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What concept establishes that the parties involved in an action or event cannot deny having been involved?
Authorization
Non-repudiation
Zero Trust
Honeypot
Answer explanation
Non-repudiation establishes that the parties involved cannot deny their participation in an action or event, ensuring accountability and trustworthiness.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which access control method is described by resource owners having the authority to grant or deny access to other users?
RBAC
ABAC
MAC
DAC
Answer explanation
The access control method described by resource owners having the authority to grant or deny access to other users is DAC (Discretionary Access Control). In DAC, users have control over their resources and can decide who can access them.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What physical access control method prevents tailgating by ensuring only one individual at a time can authenticate and be granted physical access through a barrier?
Policy Enforcement Point
Access badge
Access Control Vestibule
Control plane
Answer explanation
The physical access control method that prevents tailgating by ensuring only one individual at a time can authenticate and be granted access through a barrier is the Access Control Vestibule.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which security category focuses on policies, procedures, and overall management of security within an organization?
Managerial
Operational
Technical
Physical
Answer explanation
The security category that focuses on policies, procedures, and overall management of security within an organization is Managerial.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which security category is exemplified by network security, encryption, authentication mechanisms, IDSs, and firewalls?
Managerial
Physical
Technical
Operational
Answer explanation
The correct security category exemplified by network security, encryption, authentication mechanisms, IDSs, and firewalls is Technical.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization posts "No Trespassing" signs. What type of security control is this considered?
Deterrent
Detective
Preventive
Corrective
Answer explanation
The 'No Trespassing' signs act as a deterrent by warning individuals not to trespass, aiming to prevent unauthorized access to the organization's property.
Create a free account and access millions of resources
Similar Resources on Wayground
76 questions
Quiz di Sicurezza Informatica

Quiz
•
9th Grade - University
76 questions
Network Quiz

Quiz
•
12th Grade
80 questions
Unit 1 LO3 Complete Set of Questions

Quiz
•
11th - 12th Grade
72 questions
Computer Networks Quiz

Quiz
•
12th Grade
75 questions
Computer II

Quiz
•
12th Grade
70 questions
Latihan Test Pengetahuan AIJ Kelas XII

Quiz
•
12th Grade
75 questions
APCS Principles Practice Exam

Quiz
•
8th Grade - University
80 questions
preTEST Pranata Komputer Terampil Part 1

Quiz
•
10th Grade - Professi...
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade