Identity and Access Control Quiz

Identity and Access Control Quiz

University

15 Qs

quiz-placeholder

Similar activities

Wireless Networks Quiz 2

Wireless Networks Quiz 2

University

20 Qs

Cloud Computing

Cloud Computing

University - Professional Development

10 Qs

Cloud Computing

Cloud Computing

University

10 Qs

SURVEILLANCE CONTROL SYSTEM

SURVEILLANCE CONTROL SYSTEM

University

15 Qs

Quiz on Access Control Models

Quiz on Access Control Models

University

20 Qs

Module 14 (Fundamentals of Cybersecurity)

Module 14 (Fundamentals of Cybersecurity)

University

16 Qs

Introduction to database systems

Introduction to database systems

University

10 Qs

Introduction to Database

Introduction to Database

University

18 Qs

Identity and Access Control Quiz

Identity and Access Control Quiz

Assessment

Quiz

Computers

University

Hard

Created by

Keitumetse Taumoloko

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of limiting users to access only the functionality and data that they are specifically permitted to use?

Authentication

Authorization

Authentication

Access Control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which component defines the user or entity making the request in the access control system?

Subject

Group

Object

Role

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most common attack on access control where an attacker manipulates input to access unauthorized features or data?

Data Breach

SQL Injection

Privilege Escalation

Cross-Site Scripting

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access control anti-pattern relies on protecting parts of the system based on obscure URLs and patterns?

Using Request Data for Policy Decisions

Relying on Obscurity

Avoiding Access Control Features

Hard Coded Policy

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the key design flaw of hard coded authorization policies in an application?

Difficulty in Auditing

Ease of Adaptation

Scalability

Flexibility

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which guiding principle suggests building a centralized access control engine/decision maker?

Server-Side Trusted Data

Consider a Centralized Enforcement Layer

Build a Centralized Engine

Group Subjects and Objects

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main limitation of Role-Based Access Control (RBAC) compared to Attribute-Based Access Control (ABAC)?

Data-Specific Control

Context-Specific Control

Real-Time Capabilities

Complexity

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?