Search Header Logo

ACI Sec+ Midweek

Authored by Pat Johnson

Computers

12th Grade

ACI Sec+ Midweek
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

75 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term does NOT represent a pillar of cybersecurity?

Authentication

Confidentiality

Availability

Integrity

Answer explanation

The term 'Confidentiality' does NOT represent a pillar of cybersecurity. The pillars are Authentication, Availability, and Integrity.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What concept establishes that the parties involved in an action or event cannot deny having been involved?

Authorization

Non-repudiation

Zero Trust

Honeypot

Answer explanation

Non-repudiation establishes that the parties involved cannot deny their participation in an action or event, ensuring accountability and trustworthiness.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access control method is described by resource owners having the authority to grant or deny access to other users?

RBAC

ABAC

MAC

DAC

Answer explanation

The access control method described by resource owners having the authority to grant or deny access to other users is DAC (Discretionary Access Control). In DAC, users have control over their resources and can decide who can access them.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What physical access control method prevents tailgating by ensuring only one individual at a time can authenticate and be granted physical access through a barrier?

Policy Enforcement Point

Access badge

Access Control Vestibule

Control plane

Answer explanation

The physical access control method that prevents tailgating by ensuring only one individual at a time can authenticate and be granted access through a barrier is the Access Control Vestibule.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security category focuses on policies, procedures, and overall management of security within an organization?

Managerial

Operational

Technical

Physical

Answer explanation

The security category that focuses on policies, procedures, and overall management of security within an organization is Managerial.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security category is exemplified by network security, encryption, authentication mechanisms, IDSs, and firewalls?

Managerial

Physical

Technical

Operational

Answer explanation

The correct security category exemplified by network security, encryption, authentication mechanisms, IDSs, and firewalls is Technical.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization posts "No Trespassing" signs. What type of security control is this considered?

Deterrent

Detective

Preventive

Corrective

Answer explanation

The 'No Trespassing' signs act as a deterrent by warning individuals not to trespass, aiming to prevent unauthorized access to the organization's property.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?