ISC3 - Domain 3 - Access Control Concepts

ISC3 - Domain 3 - Access Control Concepts

Professional Development

28 Qs

quiz-placeholder

Similar activities

LH Active L1: Outbound Review

LH Active L1: Outbound Review

Professional Development

25 Qs

ALTSCHOOL QUIZ 13/9/25

ALTSCHOOL QUIZ 13/9/25

Professional Development

25 Qs

Bendy and the ink machine

Bendy and the ink machine

Professional Development

26 Qs

Python Programming Quiz 1

Python Programming Quiz 1

Professional Development

30 Qs

Net+ day 5

Net+ day 5

Professional Development

25 Qs

Python Basics quiz

Python Basics quiz

Professional Development

25 Qs

Post Test Bimtek Penanganan Insiden Siber  Kabupaten Tangerang

Post Test Bimtek Penanganan Insiden Siber Kabupaten Tangerang

Professional Development

25 Qs

Network and Security Quiz

Network and Security Quiz

Professional Development

25 Qs

ISC3 - Domain 3 - Access Control Concepts

ISC3 - Domain 3 - Access Control Concepts

Assessment

Quiz

Information Technology (IT)

Professional Development

Hard

FREE Resource

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of security control?

Computer mouse

Firewall

Network cable

Web browser

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of an object in the context of access controls?

A device with onboard firmware

An entity that responds to a request for service

Anything that initiates a request for service

Something that contains its own access control logic

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Derrick logs on to a system to read a file.  In this example, Derrick is the ______.

Object

Predicate

Process

Subject

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a subject?

Fence

File

Filename

User

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the strategy that integrates people, technology, and operations capabilities to establish variable barriers across multiple layers and missions of an organization?

Cyberattack Prevention

Layered Defense

Multi-Factor Authentication

Single Point of Failure

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does privileged access management implement the principle of least privilege?

By granting each user access only to the items they need

By granting maximum access to all users

By providing access based on seniority

By restricting access to only the most critical information

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Mandatory Access Control (MAC), what determines the level of access to certain areas in certain government agencies?

Government policy and security clearance

Individual judgment

On a request basis

Owner's discretion

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?