
Quarter 4 - Quiz 3
Authored by Eugene Valdoz
Computers
12th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Is a security technique that regulates who or what can view or use resources in a computing environment.
Access Control
Physical Access Control
Logical Access Control
Network Access Control
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A computer programmer wants to limit access to campuses, buildings, rooms and physical IT assets. What access control is required to use?
Access Control
Physical Access Control
Logical Access Control
Network Access Control
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A computer programmer wants to limit connections to computer networks, system files and data. What access control is required to use?
Access Control
Physical Access Control
Logical Access Control
Network Access Control
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
This is a security model in which access rights are regulated by a central authority based on multiple levels of security.
Mandatory access control (MAC)
Physical Access Control
Logical Access Control
Discretionary access control (DAC)
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
This is an access control method in which owners or administrators of the protected system, data or resource set the policies defining who or what is authorized to access the resource.
Mandatory access control (MAC)
Physical Access Control
Logical Access Control
Discretionary access control (DAC)
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
This is a widely used access control mechanism that restricts access to computer resources based on individuals or groups with defined business functions.
Mandatory access control (MAC)
Role-based access control (RBAC)
Rule-based access control
Discretionary access control (DAC)
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
This is a security model in which the system administrator defines the rules that govern access to resource objects.
Mandatory access control (MAC)
Role-based access control (RBAC)
Rule-based access control
Discretionary access control (DAC)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?