IDAM and Network Architecture

IDAM and Network Architecture

11th Grade

30 Qs

quiz-placeholder

Similar activities

Unit 6 Exam Review Part 1

Unit 6 Exam Review Part 1

9th - 12th Grade

26 Qs

CNET151 Chap 10 - Security Policies

CNET151 Chap 10 - Security Policies

11th Grade - University

25 Qs

Mod 8 Managing User Security Review

Mod 8 Managing User Security Review

9th - 12th Grade

25 Qs

Managing User Security 3.1

Managing User Security 3.1

9th - 12th Grade

25 Qs

Threats To Data V2

Threats To Data V2

10th - 12th Grade

25 Qs

ITS Study Guide

ITS Study Guide

9th - 11th Grade

25 Qs

Computer Science 1: Big Idea #5 Review

Computer Science 1: Big Idea #5 Review

9th - 12th Grade

30 Qs

Cybersecurity Ch 1 & 2

Cybersecurity Ch 1 & 2

9th - 12th Grade

25 Qs

IDAM and Network Architecture

IDAM and Network Architecture

Assessment

Quiz

Computers

11th Grade

Easy

Created by

Carlos Sowell

Used 5+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the term for the process of validating a subject's identity?

Authentication

Auditing

Identification

Authorization

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee traveling in Europe for vacation submitted a ticket as they could not access their work email. Which policy does the company use?

Password management

Location-based authentication

Multi-factor authentication

Password age

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A contractor only works for a company from 9 a.m. to 12 p.m. What kind of restriction could the company set up on the contractor's account to prevent using it outside that range?

Time-based restrictions

Password restrictions

Location-based restrictions

Mandatory access control

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What MFA philosophy uses knowledge factors and includes passphrases to gain access to systems?

Something you have

Somewhere you are

Something you are

Something you know

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of password is maryhadalittlelamb?

Cognitive

Passphrase

Static

Composition

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security principle are you complying with when you assign access permissions so that users can only access the resources required to accomplish their specific work tasks?

Need to know

Cross-training

Job rotation

Principle of least privilege

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which form of access control environment is access controlled by rules rather than identity?

Discretionary access control (DAC)

Most client-server environments

Access control list (ACL)

Mandatory access control (MAC)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?