Search Header Logo

Quiz Access Control

Authored by Yudhistira Nugraha

Information Technology (IT)

University

Used 1+ times

Quiz Access Control
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A multinational company experienced data leakage due to unauthorized file sharing among departments. Which principle of access control was most likely violated?

Separation of Duties

Need-to-Know Principle

Least Privilege

Accountability

Data Provenance

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a government agency, employees can only access the citizen database during office hours and within the building network. Which control mechanism ensures this restriction?

Discretionary Access Control

Temporal Access Policy

Context-Aware Access Control

Role-Based Authorization

Multi-tenant Segmentation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A healthcare application encrypts patient data but fails to log who accessed it. Which access control principle is missing?

Confidentiality

Authorization

Availability

Accountability

Non-repudiation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a university e-learning system, a student (subject) attempts to modify exam results stored in a gradebook (object). Which access right should prevent this?

Read-only privilege

Write privilege

Ownership right

Execute privilege

Delegation right

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A smart home system allows multiple users to control the same thermostat. The system must differentiate between who requested and who authorized the action. This distinction reflects:

User hierarchy

Subject-object mapping

Trust delegation

Functional dependency

Process inheritance

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cloud database administrator grants a temporary data scientist access to a specific dataset but not the schema or configuration files. This illustrates:

Role inheritance

Fine-grained object control

Coarse-grained delegation

Hybrid privilege escalation

Function-based segregation

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A startup allows employees to set permissions for files they create. Later, one intern accidentally exposes sensitive client data publicly. What is the main weakness of DAC shown here?

Centralized enforcement

User-dependent control

Context-insensitive policies

Hierarchical assignment

Over-classification of data

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?