ACI Sec+ Midweek

ACI Sec+ Midweek

12th Grade

75 Qs

quiz-placeholder

Similar activities

Communications and Networks EOU Test

Communications and Networks EOU Test

12th Grade

72 Qs

ENSA - Modules 9-12

ENSA - Modules 9-12

12th Grade

72 Qs

simulasi 2

simulasi 2

1st - 12th Grade

75 Qs

Latihan Ujian Produktif TKJ Teknik Komputer dan jaringan

Latihan Ujian Produktif TKJ Teknik Komputer dan jaringan

10th - 12th Grade

80 Qs

Modules 10-13: L2 Security and WLANs

Modules 10-13: L2 Security and WLANs

12th Grade

80 Qs

CompTIA A+

CompTIA A+

11th Grade - University

80 Qs

Cengage CompTIA A+ Guide to Technical Support

Cengage CompTIA A+ Guide to Technical Support

11th Grade - University

80 Qs

SRWE Final Exam Q's 1-60

SRWE Final Exam Q's 1-60

12th Grade

71 Qs

ACI Sec+ Midweek

ACI Sec+ Midweek

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Pat Johnson

FREE Resource

75 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term does NOT represent a pillar of cybersecurity?

Authentication

Confidentiality

Availability

Integrity

Answer explanation

The term 'Confidentiality' does NOT represent a pillar of cybersecurity. The pillars are Authentication, Availability, and Integrity.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What concept establishes that the parties involved in an action or event cannot deny having been involved?

Authorization

Non-repudiation

Zero Trust

Honeypot

Answer explanation

Non-repudiation establishes that the parties involved cannot deny their participation in an action or event, ensuring accountability and trustworthiness.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access control method is described by resource owners having the authority to grant or deny access to other users?

RBAC

ABAC

MAC

DAC

Answer explanation

The access control method described by resource owners having the authority to grant or deny access to other users is DAC (Discretionary Access Control). In DAC, users have control over their resources and can decide who can access them.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What physical access control method prevents tailgating by ensuring only one individual at a time can authenticate and be granted physical access through a barrier?

Policy Enforcement Point

Access badge

Access Control Vestibule

Control plane

Answer explanation

The physical access control method that prevents tailgating by ensuring only one individual at a time can authenticate and be granted access through a barrier is the Access Control Vestibule.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security category focuses on policies, procedures, and overall management of security within an organization?

Managerial

Operational

Technical

Physical

Answer explanation

The security category that focuses on policies, procedures, and overall management of security within an organization is Managerial.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security category is exemplified by network security, encryption, authentication mechanisms, IDSs, and firewalls?

Managerial

Physical

Technical

Operational

Answer explanation

The correct security category exemplified by network security, encryption, authentication mechanisms, IDSs, and firewalls is Technical.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization posts "No Trespassing" signs. What type of security control is this considered?

Deterrent

Detective

Preventive

Corrective

Answer explanation

The 'No Trespassing' signs act as a deterrent by warning individuals not to trespass, aiming to prevent unauthorized access to the organization's property.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers