ISC3 - Domain 3 - Access Control Concepts

ISC3 - Domain 3 - Access Control Concepts

Professional Development

28 Qs

quiz-placeholder

Similar activities

HERRAMIENTAS DIGITALES1

HERRAMIENTAS DIGITALES1

Professional Development

24 Qs

Information Security Awareness Training Quiz

Information Security Awareness Training Quiz

Professional Development

30 Qs

AWS Solutions Architect Associate - Networking and VPC

AWS Solutions Architect Associate - Networking and VPC

Professional Development

23 Qs

DCP Utilization and Maintenance

DCP Utilization and Maintenance

Professional Development

25 Qs

AZ-500 Final quiz GSI

AZ-500 Final quiz GSI

Professional Development

24 Qs

Networking and Routing Quiz 1

Networking and Routing Quiz 1

Professional Development

23 Qs

Network+ 802.11, cellular, vpn

Network+ 802.11, cellular, vpn

Professional Development

23 Qs

cryptography

cryptography

Professional Development

25 Qs

ISC3 - Domain 3 - Access Control Concepts

ISC3 - Domain 3 - Access Control Concepts

Assessment

Quiz

Information Technology (IT)

Professional Development

Hard

FREE Resource

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of security control?

Computer mouse

Firewall

Network cable

Web browser

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of an object in the context of access controls?

A device with onboard firmware

An entity that responds to a request for service

Anything that initiates a request for service

Something that contains its own access control logic

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Derrick logs on to a system to read a file.  In this example, Derrick is the ______.

Object

Predicate

Process

Subject

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a subject?

Fence

File

Filename

User

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the strategy that integrates people, technology, and operations capabilities to establish variable barriers across multiple layers and missions of an organization?

Cyberattack Prevention

Layered Defense

Multi-Factor Authentication

Single Point of Failure

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does privileged access management implement the principle of least privilege?

By granting each user access only to the items they need

By granting maximum access to all users

By providing access based on seniority

By restricting access to only the most critical information

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Mandatory Access Control (MAC), what determines the level of access to certain areas in certain government agencies?

Government policy and security clearance

Individual judgment

On a request basis

Owner's discretion

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?