It is the method by which systems determine whether and how to admit a user into a trusted area of the organization

LESSON 5

Quiz
•
Lilibeth Antonio
•
Instructional Technology
•
University
•
11 plays
•
Medium
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Internet Access
Access Control
Control List
None of the these
2.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Through authentication and authorization, access control policies make sure users are who they say they are and that they have appropriate access to company data.
TRUE
FALSE
3.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Access control cannot be applied to limit physical access to campuses, buildings, rooms, and data centers
TRUE
FALSE
4.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
It grants access based on defined business functions rather than the individual user’s identity.
Mandatory access control
Role-based access control
Attribute-based access control
Discretionary access control
5.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
In this method, the owner or administrator of the protected system, data, or resource sets the policies for who is allowed access.
Mandatory access control
Role-based access control
Attribute-based access control
Discretionary access control
6.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
It’s common in government and military environments.
Mandatory access control
Role-based access control
Attribute-based access control
Discretionary access control
7.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Attribute-based access control draws on a set of characteristics called “attributes.”
TRUE
FALSE
8.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Without a robust access control policy, organizations risk data leakage from both internal and external sources.
TRUE
FALSE
9.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
A firewall is a network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules.
TRUE
FALSE
10.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Intrusion is when attacker attempts to gain entry or disrupt normal operation
TRUE
FALSE
Explore all questions with a free account
Similar Resources on Quizizz
10 questions
Creating tables in HTML

Quiz
•
University
10 questions
DoD EA TRM

Quiz
•
University
14 questions
Community Resources and Development Quiz

Quiz
•
University
15 questions
Flexible Manufacturing System (FMS)

Quiz
•
University
12 questions
Siemens Servo

Quiz
•
University - Professi...
10 questions
Checkpoint 2 Review - 12 A

Quiz
•
12th Grade - University
10 questions
Understanding the Basic Concepts in ICT

Quiz
•
University
10 questions
Creating Web Pages

Quiz
•
University
Popular Resources on Quizizz
17 questions
CAASPP Math Practice 3rd

Quiz
•
3rd Grade
20 questions
math review

Quiz
•
4th Grade
21 questions
6th Grade Math CAASPP Practice

Quiz
•
6th Grade
13 questions
Cinco de mayo

Interactive video
•
6th - 8th Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
10 questions
4th Grade Math CAASPP (part 1)

Quiz
•
4th Grade
45 questions
5th Grade CAASPP Math Review

Quiz
•
5th Grade
Discover more resources for Instructional Technology
15 questions
Disney Trivia

Quiz
•
University
44 questions
APES Exam Review 2017

Quiz
•
11th Grade - University
22 questions
TSIA2 Math - TSI MATH 2.0 Review 1 (950ish)

Quiz
•
6th Grade - University
25 questions
APUSH Decades Review

Quiz
•
9th Grade - University
12 questions
Scientific Notation

Quiz
•
University
96 questions
World History 1 Sol Review

Quiz
•
9th Grade - University
20 questions
Unit Circle & Trig

Quiz
•
10th Grade - University
20 questions
Preterito vs. Imperfecto

Quiz
•
KG - University