Access Control & User Restrictions

Access Control & User Restrictions

12th Grade

14 Qs

quiz-placeholder

Similar activities

Java: repetition control structure for & while

Java: repetition control structure for & while

10th - 12th Grade

10 Qs

Trò chơi ôn tập Tin 12 lần 1

Trò chơi ôn tập Tin 12 lần 1

12th Grade

10 Qs

Quiz Komponen Komputer

Quiz Komponen Komputer

1st Grade - University

10 Qs

ESBWB Workbook Domain 1 Lesson 2

ESBWB Workbook Domain 1 Lesson 2

9th - 12th Grade

15 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

Hosting : cPanel Share & VPS

Hosting : cPanel Share & VPS

12th Grade

15 Qs

Scratch

Scratch

KG - Professional Development

10 Qs

AI Checkpoint 1 Revision

AI Checkpoint 1 Revision

9th - 12th Grade

16 Qs

Access Control & User Restrictions

Access Control & User Restrictions

Assessment

Quiz

Computers

12th Grade

Practice Problem

Easy

Created by

Ann Watterson

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of Role-Based Access Control (RBAC)?

To allow all users full access to system resources

To assign permissions based on job roles and responsibilities

To prevent any user from accessing shared resources

To encrypt all user data by default

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Principle of Least Privilege (PoLP) states that users should have:

Full administrative rights at all times

Access only to the resources necessary for their role

No access to any system resources

The ability to modify security policies

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does an Access Control List (ACL) do?

Restricts physical access to a server room

Defines which users or systems can access specific files or resources

Encrypts files before they are stored on a server

Allows unrestricted access to all users

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Windows, which type of permission allows a user to view but not modify a file?

Full Control

Modify

Read

Write

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Linux, which command is used to change file permissions?

chmod

ls

mkdir

echo

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of File Integrity Monitoring (FIM)?

To monitor file size for performance reasons

To detect unauthorized modifications to sensitive files

To delete duplicate files on a system

To allow all users access to system files

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which encryption method is commonly used for securing files on a hard drive?

WPA2

AES

SHA-256

UDP

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?