ISC2 - CC - Chapter 3 - Module 3

ISC2 - CC - Chapter 3 - Module 3

Professional Development

24 Qs

quiz-placeholder

Similar activities

A+ - 15B - Identify Features of macOS

A+ - 15B - Identify Features of macOS

Professional Development

23 Qs

ITF+ Ch9, Security Concepts & Threats

ITF+ Ch9, Security Concepts & Threats

Professional Development

20 Qs

Installing and Configuring Computer Systems 2

Installing and Configuring Computer Systems 2

Professional Development

20 Qs

CISCO M1 - Physical Layer (Module 7)

CISCO M1 - Physical Layer (Module 7)

Professional Development

20 Qs

T6 La capa de enlace de datos

T6 La capa de enlace de datos

Professional Development

20 Qs

SISTEM OPERASI Sesi 3-4

SISTEM OPERASI Sesi 3-4

KG - Professional Development

20 Qs

K1.23 Cyber Security

K1.23 Cyber Security

Professional Development

21 Qs

CompTIA Sec (IAM & Cryptography)

CompTIA Sec (IAM & Cryptography)

Professional Development

20 Qs

ISC2 - CC - Chapter 3 - Module 3

ISC2 - CC - Chapter 3 - Module 3

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Sebastian Zamorano

Used 25+ times

FREE Resource

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the definition of logical access controls?
Authentication methods that manage access to systems
Authentication methods that manage access to physical locations
Any control that involves technology
All the other answers are correct

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is access control policy?
A list of authorized users and their privileges
A list of network devices and their configurations
A set of guidelines and procedures for managing access to resources and data
A list of resources and their security requirements

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do protect logical access controls?
Physical Assets
Information
All assets
People

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following can never be considered a logical access control?
PIN number
Face pattern
Fence
USB key

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a security token?
A type of Access Control Model
A type of encryption algorithm
A physical device used to store authentication credentials
A type of biometric identifier

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do access control models allow to assign in an efficient way?
Authentication
Authorization
Non-repudiation
Accounting

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does authorization mean?
The process of verifying user's identity
The process of granting access to resources and data
The process of creating a copy of backup
The process of encrypting data

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?