
Information Security Quiz
Authored by Hadam Benachou
Computers
8th Grade
Used 11+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following ensures that only authorized parties can access a resource?
Authentication
Access control
Accountability
Encryption
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a practical requirement of information protection?
Encryption
Authentication
Data backup
Network monitoring
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of the Access Control step in securing a computer system?
To identify the subject
To authenticate the subject
To authorize access to system resources
To record transaction access
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which step is responsible for determining which subject requests access to a system resource?
Identification
Authentication
Access Control
Accountability
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main goal of the Identification step in securing a computer system?
To verify the subject's identity
To authorize access to resources
To determine which subject requests access
To record transaction access
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does Mandatory Access Control (MAC) restrict?
Access based on user roles
Access based on security labels
Access based on user preferences
Access based on time of day
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a characteristic of MAC?
Flexibility
Restriction based on security labels
Propagation of access rights
Role emulation
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?