ISC3 - Domain 3 - Access Control Concepts

ISC3 - Domain 3 - Access Control Concepts

Professional Development

28 Qs

quiz-placeholder

Similar activities

Simulado SAA-C03 23 Questões

Simulado SAA-C03 23 Questões

Professional Development

23 Qs

Social Engineering Cydex

Social Engineering Cydex

Professional Development

23 Qs

Microsoft Fabric Data Warehouse Quiz

Microsoft Fabric Data Warehouse Quiz

Professional Development

23 Qs

Cybersecurity Test

Cybersecurity Test

Professional Development

30 Qs

Xfinity Entertainment Quiz

Xfinity Entertainment Quiz

Professional Development

24 Qs

CCSA-2

CCSA-2

Professional Development

30 Qs

OE 3 CC UNIT 4 QUIZ

OE 3 CC UNIT 4 QUIZ

Professional Development

30 Qs

Design-to-Operate process in SAP S/4 HANA Quiz

Design-to-Operate process in SAP S/4 HANA Quiz

Professional Development

27 Qs

ISC3 - Domain 3 - Access Control Concepts

ISC3 - Domain 3 - Access Control Concepts

Assessment

Quiz

Information Technology (IT)

Professional Development

Hard

FREE Resource

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of security control?

Computer mouse

Firewall

Network cable

Web browser

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of an object in the context of access controls?

A device with onboard firmware

An entity that responds to a request for service

Anything that initiates a request for service

Something that contains its own access control logic

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Derrick logs on to a system to read a file.  In this example, Derrick is the ______.

Object

Predicate

Process

Subject

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a subject?

Fence

File

Filename

User

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the strategy that integrates people, technology, and operations capabilities to establish variable barriers across multiple layers and missions of an organization?

Cyberattack Prevention

Layered Defense

Multi-Factor Authentication

Single Point of Failure

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does privileged access management implement the principle of least privilege?

By granting each user access only to the items they need

By granting maximum access to all users

By providing access based on seniority

By restricting access to only the most critical information

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Mandatory Access Control (MAC), what determines the level of access to certain areas in certain government agencies?

Government policy and security clearance

Individual judgment

On a request basis

Owner's discretion

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?