ACI Sec+ Midweek

ACI Sec+ Midweek

12th Grade

75 Qs

quiz-placeholder

Similar activities

Administrasi Sistem Jaringan XII

Administrasi Sistem Jaringan XII

12th Grade

80 Qs

Latihan Test Pengetahuan AIJ Kelas XII

Latihan Test Pengetahuan AIJ Kelas XII

12th Grade

70 Qs

Netacad CIT 161 Chapt 1

Netacad CIT 161 Chapt 1

12th Grade - University

71 Qs

ID and Access Management

ID and Access Management

10th Grade - University

70 Qs

ABidenko-CS-Quiz

ABidenko-CS-Quiz

9th - 12th Grade

80 Qs

Unit 1 Troubleshooting Methodology and Hardware Basics

Unit 1 Troubleshooting Methodology and Hardware Basics

9th - 12th Grade

80 Qs

WAN

WAN

10th - 12th Grade

80 Qs

AP CSP 12-17 - TUESDAY - Super Review

AP CSP 12-17 - TUESDAY - Super Review

9th - 12th Grade

71 Qs

ACI Sec+ Midweek

ACI Sec+ Midweek

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Pat Johnson

FREE Resource

75 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term does NOT represent a pillar of cybersecurity?

Authentication

Confidentiality

Availability

Integrity

Answer explanation

The term 'Confidentiality' does NOT represent a pillar of cybersecurity. The pillars are Authentication, Availability, and Integrity.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What concept establishes that the parties involved in an action or event cannot deny having been involved?

Authorization

Non-repudiation

Zero Trust

Honeypot

Answer explanation

Non-repudiation establishes that the parties involved cannot deny their participation in an action or event, ensuring accountability and trustworthiness.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access control method is described by resource owners having the authority to grant or deny access to other users?

RBAC

ABAC

MAC

DAC

Answer explanation

The access control method described by resource owners having the authority to grant or deny access to other users is DAC (Discretionary Access Control). In DAC, users have control over their resources and can decide who can access them.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What physical access control method prevents tailgating by ensuring only one individual at a time can authenticate and be granted physical access through a barrier?

Policy Enforcement Point

Access badge

Access Control Vestibule

Control plane

Answer explanation

The physical access control method that prevents tailgating by ensuring only one individual at a time can authenticate and be granted access through a barrier is the Access Control Vestibule.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security category focuses on policies, procedures, and overall management of security within an organization?

Managerial

Operational

Technical

Physical

Answer explanation

The security category that focuses on policies, procedures, and overall management of security within an organization is Managerial.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security category is exemplified by network security, encryption, authentication mechanisms, IDSs, and firewalls?

Managerial

Physical

Technical

Operational

Answer explanation

The correct security category exemplified by network security, encryption, authentication mechanisms, IDSs, and firewalls is Technical.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization posts "No Trespassing" signs. What type of security control is this considered?

Deterrent

Detective

Preventive

Corrective

Answer explanation

The 'No Trespassing' signs act as a deterrent by warning individuals not to trespass, aiming to prevent unauthorized access to the organization's property.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?