Week 2 Quiz 2 Security Principles

Week 2 Quiz 2 Security Principles

University

10 Qs

quiz-placeholder

Similar activities

Quiz CPMK 2 ORKOM (REMEDIAL)

Quiz CPMK 2 ORKOM (REMEDIAL)

University

15 Qs

CLC Unit 2 Lesson 1,2,3 and 4 Quiz

CLC Unit 2 Lesson 1,2,3 and 4 Quiz

University

12 Qs

Data Visualization with Qlik Cloud

Data Visualization with Qlik Cloud

University

10 Qs

COM App Week 2

COM App Week 2

University

10 Qs

DifficultRound

DifficultRound

University

5 Qs

SP101 WEEK 3

SP101 WEEK 3

University

15 Qs

Cybersecurity Quiz – Unit 1

Cybersecurity Quiz – Unit 1

University

15 Qs

Ethics in ICT

Ethics in ICT

University

11 Qs

Week 2 Quiz 2 Security Principles

Week 2 Quiz 2 Security Principles

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Medium

Created by

Nasser Hilla

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the principle that advocates for giving users and processes only the minimum privileges needed to perform their functions?

Role-Based Access Control (RBAC)

Fail-Safe Defaults

Principle of Least Privilege (PoLP)

Defense in Depth

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the presentation, what is the core concept of "Fail-Safe Defaults"?

Systems should be configured to be open by default.

Users should be able to disable security features easily.

Systems should default to a secure state when there's uncertainty or a failure.

All traffic should be allowed unless a threat is detected.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Role-Based Access Control (RBAC) simplifies privilege management by assigning permissions based on what?

Individual user names

The time of day a user logs in

A user's specific role within an organization

The type of device a user is using

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does the Principle of Least Privilege (PoLP) help to reduce the attack surface of systems?

By granting all users full access to all systems.

By limiting the damage an attacker can cause if they compromise a low-privileged account.

By allowing regular users to install software.

By defaulting systems to an insecure state.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company's new file server is configured to block all inbound and outbound network traffic by default. The administrator must then create specific rules to allow necessary services like HTTP and SSH. This configuration is an example of which secure design principle?

Defense in Depth

Principle of Least Privilege (PoLP)

Role-Based Access Control (RBAC)

Fail-Safe Defaults

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A large corporation has different levels of employees: Admins, HR staff, and Finance Team members. The company uses a system that automatically grants access to specific files and applications based on these defined job functions. This approach is an effective implementation of which security concept?

Fail-Safe Defaults

Principle of Least Privilege (PoLP)

Role-Based Access Control (RBAC)

The MSR model

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A software development team is creating a new application. They decide to design the application so that if a component fails, it will stop all operations until the issue is resolved, rather than continuing to run in a potentially vulnerable state. By adopting this approach, which security principle are they prioritizing?

Role-Based Access Control (RBAC)

Principle of Least Privilege (PoLP)

Fail-Safe Defaults

Defense in Depth

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?