Chapter 4.2 CNS

Chapter 4.2 CNS

10th Grade

15 Qs

quiz-placeholder

Similar activities

Big Data & Cyber

Big Data & Cyber

9th - 12th Grade

15 Qs

10.3 Authentication

10.3 Authentication

9th - 12th Grade

11 Qs

LAN Security

LAN Security

9th Grade - Professional Development

12 Qs

Quiz CyberSecurity

Quiz CyberSecurity

1st - 12th Grade

15 Qs

BTEC DIT C3 LAB - User Access Restriction

BTEC DIT C3 LAB - User Access Restriction

10th - 11th Grade

10 Qs

IT Fundamentals - Security Threats and Authentication

IT Fundamentals - Security Threats and Authentication

10th Grade

20 Qs

SecPro Unit 6.1 and 6.2 Terminology Quiz

SecPro Unit 6.1 and 6.2 Terminology Quiz

9th - 12th Grade

10 Qs

CCST - Security Tools - Chapter 20

CCST - Security Tools - Chapter 20

9th - 12th Grade

14 Qs

Chapter 4.2 CNS

Chapter 4.2 CNS

Assessment

Quiz

Computers

10th Grade

Hard

Created by

Nurul Rahman

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is access control and how does it protect a network?

Access control is a protocol that encrypts data transmitted over a network.

Access control is a physical barrier that prevents unauthorized access to a network.

Access control is a software that scans and removes viruses from a network.

Access control is a security measure that regulates who can access and use resources in a network. It protects a network by enforcing authentication, authorization, and accounting mechanisms to ensure that only authorized users can access the network and its resources.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Explain the concept of access control policies.

Access control policies determine the speed of internet connection.

Access control policies are a set of guidelines for managing passwords.

Access control policies are a set of rules or guidelines that determine what actions or operations a user or entity can perform on a system or resource.

Access control policies are used to restrict access to physical locations.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of AAA in controlling network access?

AAA is used for encrypting network traffic.

AAA is a protocol for routing network traffic.

AAA is a hardware device for network access control.

AAA provides a framework for managing user access to network resources.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Name three types of access control methods.

ACL, PAM, CAPTCHA

RBAC, DAC, MAC

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is role-based access control and how does it work?

RBAC is a method of allowing network access based on user location and IP address.

RBAC is a method of controlling network access based on user's social media activity.

RBAC is a method of restricting network access based on user roles and permissions.

RBAC is a method of granting network access based on user roles and permissions.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Describe discretionary access control and its advantages.

Discretionary access control (DAC) is a security model where the owner of an object has no control over who can access that object.

Discretionary access control (DAC) is a security model where the owner of an object has limited control over who can access that object.

Discretionary access control (DAC) is a security model where the owner of an object has control over who can access that object but not what actions they can perform on it.

Discretionary access control (DAC) is a security model where the owner of an object has full control over who can access that object and what actions they can perform on it. The advantages of DAC include flexibility and simplicity.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is mandatory access control and how does it differ from discretionary access control?

Mandatory access control (MAC) is a security model that enforces access permissions based on user credentials, while discretionary access control (DAC) allows the system administrator to determine access permissions.

Mandatory access control (MAC) is a security model that enforces access permissions based on user roles, while discretionary access control (DAC) allows the owner to determine access permissions.

Mandatory access control (MAC) is a security model that enforces access permissions based on user preferences, while discretionary access control (DAC) allows the system administrator to determine access permissions.

Mandatory access control (MAC) is a security model that enforces access permissions based on predefined rules, while discretionary access control (DAC) allows the owner to determine access permissions.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?