Information Assurance and Security 2 Midterm Exam

Information Assurance and Security 2 Midterm Exam

University

30 Qs

quiz-placeholder

Similar activities

CISSP Ch. 4

CISSP Ch. 4

University

35 Qs

IT Infra

IT Infra

University

30 Qs

Cybersecurity Essentials Chapter 4 Review

Cybersecurity Essentials Chapter 4 Review

9th Grade - University

25 Qs

IFT 303 Quiz one

IFT 303 Quiz one

University

25 Qs

 Wi-Fi Security

Wi-Fi Security

University

27 Qs

Nets Week - Basic Firewall

Nets Week - Basic Firewall

10th Grade - Professional Development

25 Qs

Routing and Switching Essentials pra UAS

Routing and Switching Essentials pra UAS

University

25 Qs

Keamanan Jaringan Kelas XI

Keamanan Jaringan Kelas XI

10th Grade - University

30 Qs

Information Assurance and Security 2 Midterm Exam

Information Assurance and Security 2 Midterm Exam

Assessment

Quiz

Computers

University

Medium

Created by

John Santos

Used 13+ times

FREE Resource

30 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What do you call the method by which systems determine whether and how to admit a user into trusted area of the organization?

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

It is a fundamental concept in security that minimizes risk to the business or organization.

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

It provides the ability to share resources in a peer-to-peer configuration that allows users to control and possibly provide access to information or resources at their disposal.

Mandatory Access Control (MAC)

Non-Discretionary Controls

Discretionary Access Controls (DAC)

None of the choices

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

It is a mechanism where unverified or unauthenticated entities who seek access to a resource provide a label by which they are known to the system.

Identification

Authentication

Authorization

Accountability

None of the choices

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What do you call the process of validation an unauthenticated entity's purported identity?

Identification

Authentication

Authorization

Accountability

None of the choices

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

This type of control is associated with the duties a user performs in an organization, such as a position or temporary assignment.

Mandatory access control

Role-based access controls

Task-based access controls

Discretionary access controls

None of the choices

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

It is a person who maintains the security of a system, perhaps by adding and removing access by user accounts

Owner

Custodian

End user

Subjects

None of the choices

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?