Quiz on Access Control and Cryptography

Quiz on Access Control and Cryptography

University

10 Qs

quiz-placeholder

Similar activities

Chapter 9 Audit Log

Chapter 9 Audit Log

University

10 Qs

ITBP301_Chapter 01

ITBP301_Chapter 01

University

10 Qs

Module 13 (Fundamentals of Cybersecurity)

Module 13 (Fundamentals of Cybersecurity)

University

12 Qs

Eng. S2 - #4 AI Part 1

Eng. S2 - #4 AI Part 1

University

15 Qs

Google Prof Cloud Network - pt 8

Google Prof Cloud Network - pt 8

University

15 Qs

Week10 -Access Control and Authentication

Week10 -Access Control and Authentication

University

15 Qs

Network and Cyber Security Module 1 quiz

Network and Cyber Security Module 1 quiz

University

10 Qs

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

Quiz on Access Control and Cryptography

Quiz on Access Control and Cryptography

Assessment

Quiz

Computers

University

Hard

Created by

ZINC NOLOS

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of access control?

To enhance physical security

To monitor employee performance

To manage financial transactions

To decide when and how a person can access protected areas

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of access control?

Voluntary

Compulsory

Nondiscretionary

Optional

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common method used in logical access controls?

Fingerprint comparison

Surveillance cameras

Security guards

Physical barriers

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which biometric method uses a unique human characteristic for verification?

Facial recognition

Token

Password

Single Sign-on

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does Kerberos primarily use for authentication?

Public key encryption

Symmetric key encryption

Biometric data

Digital signatures

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a security audit?

To train employees on security measures

To create new security protocols

To install new software

To evaluate the efficiency of an information system's security

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of log to be captured in security monitoring?

User Feedback Logs

System Update Logs

Performance Logs

Access Logs

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?