Week10 -Access Control and Authentication

Week10 -Access Control and Authentication

University

15 Qs

quiz-placeholder

Similar activities

Security+

Security+

University

15 Qs

CCNA Module 5 and 6

CCNA Module 5 and 6

11th Grade - University

14 Qs

CNET251 Ch 8 - Security Management Models

CNET251 Ch 8 - Security Management Models

University

11 Qs

SMART CARD 2 Get Started With AI

SMART CARD 2 Get Started With AI

University

15 Qs

Network Fundamentals-Physical layer

Network Fundamentals-Physical layer

9th Grade - Professional Development

14 Qs

CNBU108-18.08

CNBU108-18.08

University

14 Qs

CID - Access COntrol

CID - Access COntrol

University

10 Qs

Data Security

Data Security

University

15 Qs

Week10 -Access Control and Authentication

Week10 -Access Control and Authentication

Assessment

Quiz

Computers

University

Medium

Created by

Rohit Verma

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step in the access control process?

Authentication

Authorization

Identification

Accounting

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of "something you are" in authentication factors?

Password

OTP

Biometric fingerprint

Security token

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the principle of least privilege in access control?

Allowing access to all users

Granting users the minimum access required to perform their tasks

Denying all access unless explicitly approved

Allowing unrestricted access to administrative users

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access control model enforces access based on data confidentiality and user clearance levels?

Discretionary Access Control (DAC)

Mandatory Access Control (MAC)

Role-Based Access Control (RBAC)

Rule-Based Access Control (RAC)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Role-Based Access Control (RBAC), access is granted based on:

Organizational roles

User preferences

Device type

Time of day

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the key difference between an IDS and an IPS?

IDS monitors; IPS prevents attacks

IDS prevents attacks; IPS monitors

IDS uses heuristic-based detection; IPS uses signature-based detection

IDS operates inline; IPS operates offline

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT an advantage of passwordless authentication?

Reduces phishing risk

Requires password memory exercises

Faster login times

Reduces credential reuse risks

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?