Unit 2: Securing Servers and Devices

Unit 2: Securing Servers and Devices

9th - 12th Grade

15 Qs

quiz-placeholder

Similar activities

SUMMATIVE TEST IN COMPUTER 5

SUMMATIVE TEST IN COMPUTER 5

5th Grade - University

20 Qs

Cybersecurity 1.2.1 Quiz Review

Cybersecurity 1.2.1 Quiz Review

11th Grade

14 Qs

Intro to Databases

Intro to Databases

10th Grade

14 Qs

Data Literacy Quizizz

Data Literacy Quizizz

6th Grade - University

15 Qs

Թվային Աշխարհի Վտանգներ

Թվային Աշխարհի Վտանգներ

9th Grade

19 Qs

Soal Pilihan Ganda Jaringan LAN

Soal Pilihan Ganda Jaringan LAN

10th Grade

10 Qs

Professionalism in Robotics Engineering Final Assessment

Professionalism in Robotics Engineering Final Assessment

9th Grade - University

20 Qs

Python Library Routines Quiz

Python Library Routines Quiz

10th Grade - University

18 Qs

Unit 2: Securing Servers and Devices

Unit 2: Securing Servers and Devices

Assessment

Quiz

Information Technology (IT)

9th - 12th Grade

Practice Problem

Medium

Created by

Benji Loh

Used 35+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which access control model is based on the concept of granting access based on job roles or functions?

Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Attribute-Based Access Control (ABAC)

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

In which access control model does the data owner determine who can access specific data?

Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Rule-Based Access Control (RBAC)

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which access control model is typically used in government and military environments where security is paramount?

Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Attribute-Based Access Control (ABAC)

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Group Policy can be used to:

Restrict access to specific programs

Configure network settings

Install software

All of the above

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A specific homepage for all users can be enforced through:

User configuration

Software installation

Group Policy

Registry settings

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

To run scripts on computer startup or shutdown, you would use:

Group Policy Startup/Shutdown scripts

Task Scheduler

Registry settings

Command Prompt

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Group Policy can be used to:

Control user interface customization

Enforce security settings

Manage software updates

All of the above

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?