Authentication/Access Control/Enterprise Architecture

Authentication/Access Control/Enterprise Architecture

9th Grade

•

50 Qs

quiz-placeholder

Similar activities

220 - 901 Test 2

220 - 901 Test 2

University

•

47 Qs

FINAL EXAM: LIVING IN THE IT ERA

FINAL EXAM: LIVING IN THE IT ERA

University

•

50 Qs

NILAI KUIS PERTAMA

NILAI KUIS PERTAMA

University - Professional Development

•

50 Qs

ICT 151-200

ICT 151-200

University

•

50 Qs

Quiz TIK

Quiz TIK

12th Grade

•

45 Qs

ULANGAN Sistem Komputer

ULANGAN Sistem Komputer

10th Grade

•

48 Qs

Introduction to Computer

Introduction to Computer

University

•

50 Qs

AAS GANJIL TIK KLS XI TAPEL 2024/2025

AAS GANJIL TIK KLS XI TAPEL 2024/2025

12th Grade

•

50 Qs

Authentication/Access Control/Enterprise Architecture

Authentication/Access Control/Enterprise Architecture

Assessment

Quiz

•

Computers

•

9th Grade

•

Practice Problem

•

Medium

Created by

Carlos Sowell

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the term for the process of validating a subject's identity?

Authorization

Authentication

Auditing

Identification

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee traveling in Europe for vacation submitted a ticket as they could not access their work email. Which policy does the company use?

Multi-factor authentication

Password age

Password management

Location-based authentication

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A contractor only works for a company from 9 a.m. to 12 p.m. What kind of restriction could the company set up on the contractor's account to prevent using it outside that range?

Password restrictions

Mandatory access control

Location-based restrictions

Time-based restrictions

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cyber engineer conducts a multi-factor authentication (MFA) assessment of an organization's authentication security. What MFA philosophy uses knowledge factors and includes passphrases to gain access to systems?

Something you have

Somewhere you are

Something you know

Something you are

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of password is maryhadalittlelamb?

Composition

Static

Passphrase

Cognitive

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You assign access permissions so that users can only access the resources required to accomplish their specific work tasks. Which security principle are you complying with?

Principle of least privilege

Job rotation

Need to know

Cross-training

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which form of access control environment is access controlled by rules rather than identity?

Mandatory access control (MAC)

Discretionary access control (DAC)

Access control list (ACL)

Most client-server environments

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers