Unit 2: Securing Servers and Devices

Unit 2: Securing Servers and Devices

9th - 12th Grade

15 Qs

quiz-placeholder

Similar activities

Identity and Access Management Quiz

Identity and Access Management Quiz

12th Grade

15 Qs

PCI DSS and GDPR Compliance Quiz

PCI DSS and GDPR Compliance Quiz

12th Grade - University

18 Qs

7th Grade

7th Grade

7th Grade - University

17 Qs

Lesson 1: System Attacks and External Threats

Lesson 1: System Attacks and External Threats

9th - 12th Grade

15 Qs

Mobile Devices and Networking Concepts Quiz

Mobile Devices and Networking Concepts Quiz

12th Grade

15 Qs

Module 2.3.8 Quiz

Module 2.3.8 Quiz

10th Grade

10 Qs

Tech+ 2.3.4 Password Management

Tech+ 2.3.4 Password Management

10th Grade

10 Qs

JARINGAN KOMPUTER DAN INTERNET - KELAS X - INFORMATIKA SEMESTER

JARINGAN KOMPUTER DAN INTERNET - KELAS X - INFORMATIKA SEMESTER

10th Grade

15 Qs

Unit 2: Securing Servers and Devices

Unit 2: Securing Servers and Devices

Assessment

Quiz

Information Technology (IT)

9th - 12th Grade

Medium

Created by

Benji Loh

Used 23+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which access control model is based on the concept of granting access based on job roles or functions?
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Attribute-Based Access Control (ABAC)

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

In which access control model does the data owner determine who can access specific data?
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Rule-Based Access Control (RBAC)

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which access control model is typically used in government and military environments where security is paramount?
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Attribute-Based Access Control (ABAC)

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Group Policy can be used to:

Restrict access to specific programs

Configure network settings

Install software

All of the above

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A specific homepage for all users can be enforced through:

User configuration

Software installation

Group Policy

Registry settings

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

To run scripts on computer startup or shutdown, you would use:

Group Policy Startup/Shutdown scripts

Task Scheduler

Registry settings

Command Prompt

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Group Policy can be used to:

Control user interface customization

Enforce security settings

Manage software updates

All of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?