IoT security and trust Quiz III

IoT security and trust Quiz III

Professional Development

10 Qs

quiz-placeholder

Similar activities

Backoffice & Identity Management

Backoffice & Identity Management

Professional Development

15 Qs

LB COAST Test 1

LB COAST Test 1

Professional Development

10 Qs

The Internet

The Internet

6th Grade - Professional Development

14 Qs

Let's go deeper

Let's go deeper

Professional Development

10 Qs

The Need for Cybersecurity

The Need for Cybersecurity

Professional Development

10 Qs

Git - Github - GitHub Pages

Git - Github - GitHub Pages

Professional Development

11 Qs

CyberSecurity

CyberSecurity

Professional Development

12 Qs

Following P&P Procedures

Following P&P Procedures

Professional Development

10 Qs

IoT security and trust Quiz III

IoT security and trust Quiz III

Assessment

Quiz

Professional Development

Professional Development

Easy

Created by

DR 1142

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

1.What is access control?

Access control is a method for data encryption.

Access control is a method of limiting access to resources based on user permissions, granting or denying approval

Access control refers to the physical security of a building.
Access control is a way to enhance system performance.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

2.What is meant by technical access control?

Technical access control refers to physical security measures.
Technical access control involves manual approval for all system access requests.
Technical access control is the use of technology to manage and restrict access to systems and data.
Technical access control is the process of training employees on security policies.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

3.Give scenario example for authentication?

A user accessing their email without a password.
A guest browsing a public website without logging in.
A user logging into their online banking account using a username and password.
A user resetting their password via a recovery link.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

5.Mandatory access control is a ______

most restrictive

firewall configuration
encryption method
access control list

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

  1. RBAC is _____

Role-Based Access Control
Random Binary Access Control
Role-Based Account Control
Resource-Based Access Control

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

7.What is Rule based access control?

Access control based on user roles only.
Rule-based access control (RBAC) is a method of restricting access based on predefined rules.
A method that allows unrestricted access to all users.
Access control determined solely by user identity.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

8.What is AST?

Abstract Syntax Table
Abstract Syntax Text

Application security testing

Actual Security treatment

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?