Chapter 5(3of3)

Chapter 5(3of3)

University

10 Qs

quiz-placeholder

Similar activities

Lourdes Amaranta Ayala Gracia

Lourdes Amaranta Ayala Gracia

8th Grade - University

10 Qs

BIOMETRICS-UNIT-I

BIOMETRICS-UNIT-I

University

10 Qs

Internet_Intranet_Extranet

Internet_Intranet_Extranet

University

10 Qs

CLOUD COMPUTING: ACTIVITY 3

CLOUD COMPUTING: ACTIVITY 3

University

10 Qs

Guess The Logo

Guess The Logo

5th Grade - Professional Development

15 Qs

Basic on Operating System

Basic on Operating System

University

10 Qs

Enterprise development - JEE

Enterprise development - JEE

University

10 Qs

Pop Quiz- Abstraction, Algorithm

Pop Quiz- Abstraction, Algorithm

University

14 Qs

Chapter 5(3of3)

Chapter 5(3of3)

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Khairul Imtiyaz

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization is implementing a security measure where security clearance levels are assigned to objects and users. Users can only access objects with a clearance level equal to or lower than their own, and these clearance levels cannot be changed by users. Which access control method aligns with this description?

Discretionary Access Control (DAC)

Attribute-Based Access Control (ABAC)

Mandatory Access Control (MAC)

Role-Based Access Control (RBAC)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In an organization where strict control over access rights is essential, which access control method assigns security clearance levels to objects and users, ensuring that users can only access objects with clearance levels equal to or lower than their own, and prevents users from altering security settings?

Attribute-Based Access Control (ABAC)

Role-Based Access Control (RBAC)

Discretionary Access Control (DAC)

Mandatory Access Control (MAC)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization is implementing an access control model where access policies are determined by system-enforced rules rather than by system users. These rules complement protections based on discretionary access control. Which access control model aligns with this description?

Rule-Based Access Control (RBAC)

Role-Based Access Control (RBAC)

Mandatory Access Control (MAC)

Discretionary Access Control (DAC)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In an organization where access policies are determined by system-enforced rules rather than by system users, which access control model is implemented to complement protections based on discretionary access control?

Discretionary Access Control (DAC)

Rule-Based Access Control (RBAC)

Mandatory Access Control (MAC)

Role-Based Access Control (RBAC)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a network environment where incoming and outgoing network traffic needs to be regulated based on predefined rules, which security solution utilizes rule-based access control?

Web Application Firewalls (WAF)

Intrusion Detection and Prevention Systems (IDPS)

Email Filtering Systems

Network Firewalls

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security solution utilizes rule-based access control to protect web applications from cyber threats such as SQL injection, cross-site scripting (XSS), and distributed denial-of-service (DDoS) attacks by inspecting HTTP requests and responses?

Intrusion Detection and Prevention Systems (IDPS)

Web Application Firewalls (WAF)

Network Firewalls

Email Filtering Systems

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which of the following scenarios is Role-Based Access Control (RBAC) commonly implemented?

Filtering incoming emails based on predefined criteria.

Detecting and preventing potential security threats within a network.

Regulating access to system resources and files in operating systems.

Analyzing network traffic patterns and comparing them against predefined rules.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?