IAS1-FINAL EXAMINATION

IAS1-FINAL EXAMINATION

University

50 Qs

quiz-placeholder

Similar activities

Câu hỏi về Mạng và Giao thức

Câu hỏi về Mạng và Giao thức

University

54 Qs

Кәсіби ағылшын 151 - 200

Кәсіби ағылшын 151 - 200

University

50 Qs

MCS411 FINAL EXAMINATION

MCS411 FINAL EXAMINATION

University

46 Qs

CISCO AIDANA

CISCO AIDANA

University

52 Qs

DDPK Networking Service

DDPK Networking Service

10th Grade - University

50 Qs

Networking Concepts Quiz

Networking Concepts Quiz

University

50 Qs

ИКТ  50 - 100

ИКТ 50 - 100

University

50 Qs

GE IT ERA- Quiz # 1

GE IT ERA- Quiz # 1

University

55 Qs

IAS1-FINAL EXAMINATION

IAS1-FINAL EXAMINATION

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Joel Urbiso

Used 1+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of access control?
To restrict all users from accessing resources
To determine whether and how to admit a user into a trusted area
To block all network traffic
To create security loopholes

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of discretionary access control (DAC)?
Users controlling access to their own files
A centralized system assigning access privileges
Access controlled strictly by a system administrator
Access based on job roles

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Role-based access control (RBAC) assigns permissions based on:
User preference
Task completion
Organizational roles
Random allocation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is NOT a factor used for authentication?
Something the user knows
Something the user has
Something the user wants
Something the user is

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most common authentication method?
Biometric scanning
Passwords
Smart cards
Voice recognition

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of a firewall?
To increase network speed
To prevent unauthorized access to a network
To allow free data exchange between networks
To replace antivirus software

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Firewalls can be implemented as:
Separate computer systems
Software running on a router
A dedicated network security device
All of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?