Identity and Access Control Quiz

Identity and Access Control Quiz

University

15 Qs

quiz-placeholder

Similar activities

Module 14 (Fundamentals of Cybersecurity)

Module 14 (Fundamentals of Cybersecurity)

University

16 Qs

Topic 4 - Understanding System Vulnerabilities

Topic 4 - Understanding System Vulnerabilities

12th Grade - University

15 Qs

Security+ SY0-701

Security+ SY0-701

University

15 Qs

Chapter 7: User Access

Chapter 7: User Access

University

10 Qs

Quiz on Access Control Models

Quiz on Access Control Models

University

20 Qs

CID - Access COntrol

CID - Access COntrol

University

10 Qs

Security+

Security+

University

15 Qs

Identity and Access Control Quiz

Identity and Access Control Quiz

University

15 Qs

Identity and Access Control Quiz

Identity and Access Control Quiz

Assessment

Quiz

Computers

University

Hard

Created by

Keitumetse Taumoloko

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of limiting users to access only the functionality and data that they are specifically permitted to use?

Validation

Access Control

Authorization

Authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which component defines the user or entity making the request in the access control system?

Group

Subject

Object

Role

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most common attack on access control where an attacker manipulates input to access unauthorized features or data?

Malware

Phishing

Privilege Escalation

Data Breach

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access control anti-pattern relies on protecting parts of the system based on obscure URLs and patterns?

Fail open

Adding access control manually

Hard coded policy

Relying on obscurity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the key design flaw of hard coding authorization policies into application code?

Merging application code and policy

Ease of maintenance

Scalability

Flexibility

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which guiding principle suggests building a centralized access control engine/decision maker?

Consider a centralized enforcement layer

Group subjects, objects, actions, and metadata

Build a centralized access control engine

Server-side trusted data should access control decisions

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main limitation of Role-Based Access Control (RBAC) compared to Attribute-Based Access Control (ABAC)?

Adoption

Maintenance

Functionality

Ease of implementation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?