Information Assurance and Security 2 Midterm Exam

Information Assurance and Security 2 Midterm Exam

University

30 Qs

quiz-placeholder

Similar activities

CSC-3350 Part 2

CSC-3350 Part 2

University

31 Qs

Cybersecurity Essentials

Cybersecurity Essentials

10th Grade - University

25 Qs

98-366 Lesson 7 - WAN

98-366 Lesson 7 - WAN

11th Grade - University

31 Qs

Firewall Quiz

Firewall Quiz

University

26 Qs

EVALUASI FIREWALL

EVALUASI FIREWALL

University

25 Qs

CCNA 4- Chapter 6: Quality of Service

CCNA 4- Chapter 6: Quality of Service

University

25 Qs

Q2 APPLICATION LAYER

Q2 APPLICATION LAYER

University

30 Qs

Keamanan Jaringan Test

Keamanan Jaringan Test

11th Grade - University

25 Qs

Information Assurance and Security 2 Midterm Exam

Information Assurance and Security 2 Midterm Exam

Assessment

Quiz

Computers

University

Medium

Created by

John Santos

Used 13+ times

FREE Resource

30 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What do you call the method by which systems determine whether and how to admit a user into trusted area of the organization?

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

It is a fundamental concept in security that minimizes risk to the business or organization.

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

It provides the ability to share resources in a peer-to-peer configuration that allows users to control and possibly provide access to information or resources at their disposal.

Mandatory Access Control (MAC)

Non-Discretionary Controls

Discretionary Access Controls (DAC)

None of the choices

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

It is a mechanism where unverified or unauthenticated entities who seek access to a resource provide a label by which they are known to the system.

Identification

Authentication

Authorization

Accountability

None of the choices

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What do you call the process of validation an unauthenticated entity's purported identity?

Identification

Authentication

Authorization

Accountability

None of the choices

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

This type of control is associated with the duties a user performs in an organization, such as a position or temporary assignment.

Mandatory access control

Role-based access controls

Task-based access controls

Discretionary access controls

None of the choices

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

It is a person who maintains the security of a system, perhaps by adding and removing access by user accounts

Owner

Custodian

End user

Subjects

None of the choices

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?