Unit 2: Securing Servers and Devices

Unit 2: Securing Servers and Devices

9th - 12th Grade

15 Qs

quiz-placeholder

Similar activities

Cybersecurity Fundamentals SGM #1 Review

Cybersecurity Fundamentals SGM #1 Review

9th Grade

20 Qs

Tech+ 2.3.5 Password Security and Strength

Tech+ 2.3.5 Password Security and Strength

10th Grade

11 Qs

Tech+ 3.1 Reading Assessment

Tech+ 3.1 Reading Assessment

10th Grade

18 Qs

Module 2.3.8 Quiz

Module 2.3.8 Quiz

10th Grade

10 Qs

ICT Quiz 2024

ICT Quiz 2024

9th Grade

20 Qs

NF: Unit 2 Review

NF: Unit 2 Review

10th Grade

15 Qs

Uji Pengetahuan Keamanan Data

Uji Pengetahuan Keamanan Data

9th Grade

10 Qs

Data Security

Data Security

12th Grade - University

17 Qs

Unit 2: Securing Servers and Devices

Unit 2: Securing Servers and Devices

Assessment

Quiz

Information Technology (IT)

9th - 12th Grade

Medium

Created by

Benji Loh

Used 17+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which access control model is based on the concept of granting access based on job roles or functions?
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Attribute-Based Access Control (ABAC)

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

In which access control model does the data owner determine who can access specific data?
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Rule-Based Access Control (RBAC)

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which access control model is typically used in government and military environments where security is paramount?
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Attribute-Based Access Control (ABAC)

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Group Policy can be used to:

Restrict access to specific programs

Configure network settings

Install software

All of the above

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A specific homepage for all users can be enforced through:

User configuration

Software installation

Group Policy

Registry settings

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

To run scripts on computer startup or shutdown, you would use:

Group Policy Startup/Shutdown scripts

Task Scheduler

Registry settings

Command Prompt

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Group Policy can be used to:

Control user interface customization

Enforce security settings

Manage software updates

All of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?