
Unit 2: Securing Servers and Devices
Authored by Benji Loh
Information Technology (IT)
9th - 12th Grade
Used 35+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which access control model is based on the concept of granting access based on job roles or functions?
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
In which access control model does the data owner determine who can access specific data?
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which access control model is typically used in government and military environments where security is paramount?
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Group Policy can be used to:
Restrict access to specific programs
Configure network settings
Install software
All of the above
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
A specific homepage for all users can be enforced through:
User configuration
Software installation
Group Policy
Registry settings
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
To run scripts on computer startup or shutdown, you would use:
Group Policy Startup/Shutdown scripts
Task Scheduler
Registry settings
Command Prompt
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Group Policy can be used to:
Control user interface customization
Enforce security settings
Manage software updates
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?