Search Header Logo

Access Control Quiz

Authored by Richard Castuera Jr

Computers

University

Used 1+ times

Access Control Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which part of access control is responsible for determining who is requesting access to an asset?

Authentication

Identification

Authorization

Accountability

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of authorization in the access control process?

To verify the requestor's identity

To determine what resources a user can access and what actions they can perform

To log actions performed by users

To provide physical access to a facility

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Physical access controls are primarily concerned with which of the following?

Usernames and passwords

Protection of tangible assets

Biometric data

Protection of intangible assets

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT considered a form of accountability in access control?

Logging user actions

Encrypting sensitive data

Monitoring user access patterns

Auditing access logs

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which part of access control is responsible for the verification of user's identity, often using passwords, biometrics, or tokens.

Authentication

Identification

Authorization

Accountability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A university uses a system where only faculty can access certain research databases, while students have access to general information and course materials.

Mandatory Access Control (MAC)

Discretionary Access Control (DAC)

Role-Based Access Control (RBAC)

Rule-Based Access Control

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of access control is represented by the use of security cards for hotel entry?

Mandatory Access Control (MAC)

Physical Access Control

Logical Access Control

Rule-Based Access Control

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers