LESSON 5

LESSON 5

University

10 Qs

Similar activities

Creating tables in HTML

Creating tables in HTML

University

10 Qs

DoD EA TRM

DoD EA TRM

University

10 Qs

Community Resources and Development Quiz

Community Resources and Development Quiz

University

14 Qs

Flexible Manufacturing System (FMS)

Flexible Manufacturing System (FMS)

University

15 Qs

Siemens Servo

Siemens Servo

University - Professional Development

12 Qs

Checkpoint 2 Review - 12 A

Checkpoint 2 Review - 12 A

12th Grade - University

10 Qs

Understanding  the Basic Concepts in ICT

Understanding the Basic Concepts in ICT

University

10 Qs

Creating Web Pages

Creating Web Pages

University

10 Qs

LESSON 5

LESSON 5

Assessment

Quiz

Created by

Lilibeth Antonio

Instructional Technology

University

11 plays

Medium

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

It is the method by which systems determine whether and how to admit a user into a trusted area of the organization

Internet Access

Access Control

Control List

None of the these

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Through authentication and authorization, access control policies make sure users are who they say they are and that they have appropriate access to company data.

TRUE

FALSE

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Access control cannot be applied to limit physical access to campuses, buildings, rooms, and data centers

TRUE

FALSE

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

It grants access based on defined business functions rather than the individual user’s identity.

Mandatory access control

Role-based access control

Attribute-based access control

Discretionary access control

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

In this method, the owner or administrator of the protected system, data, or resource sets the policies for who is allowed access.

Mandatory access control

Role-based access control

Attribute-based access control

Discretionary access control

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

It’s common in government and military environments.

Mandatory access control

Role-based access control

Attribute-based access control

Discretionary access control

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Attribute-based access control draws on a set of characteristics called “attributes.”

TRUE

FALSE

8.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Without a robust access control policy, organizations risk data leakage from both internal and external sources.

TRUE

FALSE

9.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A firewall is a network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules.

TRUE

FALSE

10.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Intrusion is when attacker attempts to gain entry or disrupt normal operation

TRUE

FALSE

Explore all questions with a free account

or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?