Week10 -Access Control and Authentication

Week10 -Access Control and Authentication

University

15 Qs

quiz-placeholder

Similar activities

Quiz 1

Quiz 1

University

11 Qs

Operating System Security Quiz

Operating System Security Quiz

University

20 Qs

Module 9 (Fundamentals of Cybersecurity)

Module 9 (Fundamentals of Cybersecurity)

University

10 Qs

Introduction to database systems

Introduction to database systems

University

10 Qs

QUIZ KEMANAN JARINGAN

QUIZ KEMANAN JARINGAN

University

20 Qs

Intrusion Detection Systems

Intrusion Detection Systems

University

20 Qs

MSG University - Basic Security

MSG University - Basic Security

University

10 Qs

CPE2304 Quiz#5 problem 11-20

CPE2304 Quiz#5 problem 11-20

University

10 Qs

Week10 -Access Control and Authentication

Week10 -Access Control and Authentication

Assessment

Quiz

Computers

University

Medium

Created by

Rohit Verma

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step in the access control process?

Authentication

Authorization

Identification

Accounting

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of "something you are" in authentication factors?

Password

OTP

Biometric fingerprint

Security token

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the principle of least privilege in access control?

Allowing access to all users

Granting users the minimum access required to perform their tasks

Denying all access unless explicitly approved

Allowing unrestricted access to administrative users

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access control model enforces access based on data confidentiality and user clearance levels?

Discretionary Access Control (DAC)

Mandatory Access Control (MAC)

Role-Based Access Control (RBAC)

Rule-Based Access Control (RAC)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Role-Based Access Control (RBAC), access is granted based on:

Organizational roles

User preferences

Device type

Time of day

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the key difference between an IDS and an IPS?

IDS monitors; IPS prevents attacks

IDS prevents attacks; IPS monitors

IDS uses heuristic-based detection; IPS uses signature-based detection

IDS operates inline; IPS operates offline

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT an advantage of passwordless authentication?

Reduces phishing risk

Requires password memory exercises

Faster login times

Reduces credential reuse risks

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?