Quarter 4 - Quiz 3

Quarter 4 - Quiz 3

12th Grade

10 Qs

quiz-placeholder

Similar activities

Authentication and Control

Authentication and Control

9th - 12th Grade

6 Qs

WAS Logical Flaws

WAS Logical Flaws

12th Grade - Professional Development

7 Qs

Exploring Database Security Concepts

Exploring Database Security Concepts

12th Grade

15 Qs

Topic 4 - Understanding System Vulnerabilities

Topic 4 - Understanding System Vulnerabilities

12th Grade - University

15 Qs

Data revision questions

Data revision questions

9th - 12th Grade

8 Qs

AP CK Cybersecurity Unit 2

AP CK Cybersecurity Unit 2

12th Grade

10 Qs

Mastering Physical Security Concepts

Mastering Physical Security Concepts

12th Grade - University

15 Qs

Introduction to MS Access 2013

Introduction to MS Access 2013

7th Grade - University

10 Qs

Quarter 4 - Quiz 3

Quarter 4 - Quiz 3

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Eugene Valdoz

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Is a security technique that regulates who or what can view or use resources in a computing environment.

Access Control

Physical Access Control

Logical Access Control

Network Access Control

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A computer programmer wants to limit access to campuses, buildings, rooms and physical IT assets. What access control is required to use?

Access Control

Physical Access Control

Logical Access Control

Network Access Control

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A computer programmer wants to limit connections to computer networks, system files and data. What access control is required to use?

Access Control

Physical Access Control

Logical Access Control

Network Access Control

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

This is a security model in which access rights are regulated by a central authority based on multiple levels of security.

Mandatory access control (MAC)

Physical Access Control

Logical Access Control

Discretionary access control (DAC)

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

This is an access control method in which owners or administrators of the protected system, data or resource set the policies defining who or what is authorized to access the resource.

Mandatory access control (MAC)

Physical Access Control

Logical Access Control

Discretionary access control (DAC)

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

This is a widely used access control mechanism that restricts access to computer resources based on individuals or groups with defined business functions.

Mandatory access control (MAC)

Role-based access control (RBAC)

Rule-based access control

Discretionary access control (DAC)

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

This is a security model in which the system administrator defines the rules that govern access to resource objects.

Mandatory access control (MAC)

Role-based access control (RBAC)

Rule-based access control

Discretionary access control (DAC)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?