What does the principle of "least privilege" imply?
IAS 2 Security Architecture and Design Quiz 3

Quiz
•
Computers
•
University
•
Easy
Darwin Vargas
Used 2+ times
FREE Resource
35 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A. Users should have access to all resources
B. Users should have the minimum access necessary to perform their job functions
C. Security should be implemented through hidden mechanisms
D. Security should be based on the user's rank
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a security policy?
A. A set of guidelines for aesthetic design
B. A document outlining the rules and procedures for protecting assets
C. A software tool for managing security
D. A list of all users and their permissions
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the context of security design, what does CIA stand for?
A. Confidentiality, Integrity, Availability
B. Central Intelligence Agency
C. Confidentiality, Information, Authentication
D. Control, Integrity, Access
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of a demilitarized zone (DMZ) in network security?
A. To store backup data
B. To host internal company resources
C. To provide an additional layer of security for external-facing services
D. To monitor employee activities
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a firewall?
A. A physical barrier to prevent unauthorized entry
B. A system designed to prevent unauthorized access to or from a private network
C. A software for managing user credentials
D. An encryption technique
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes a "honeypot"?
A. A security mechanism that records all network traffic
B. A system designed to attract and trap potential attackers
C. A database of known security threats
D. A method for securing wireless networks
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the term "asymmetric cryptography" refer to?
A. Cryptography using the same key for encryption and decryption
B. Cryptography using different keys for encryption and decryption
C. Cryptography without any keys
D. Cryptography using hash functions
Create a free account and access millions of resources
Similar Resources on Wayground
30 questions
CSC408_Chapter 5: Foundation of Business Intelligence

Quiz
•
University
34 questions
Cybersecurity Formative Assessment

Quiz
•
12th Grade - University
37 questions
IM1_Integrative Programming_LQ2

Quiz
•
University
40 questions
Global info revision

Quiz
•
11th Grade - University
40 questions
NETWORK & COMMUNICATION FINAL (Long Quiz)

Quiz
•
University
40 questions
Midterm: Information Assurance and Security

Quiz
•
University
30 questions
Network Topologies Quiz

Quiz
•
9th Grade - University
34 questions
TestOut Quiz DLP P/Q

Quiz
•
11th Grade - University
Popular Resources on Wayground
25 questions
Equations of Circles

Quiz
•
10th - 11th Grade
30 questions
Week 5 Memory Builder 1 (Multiplication and Division Facts)

Quiz
•
9th Grade
33 questions
Unit 3 Summative - Summer School: Immune System

Quiz
•
10th Grade
10 questions
Writing and Identifying Ratios Practice

Quiz
•
5th - 6th Grade
36 questions
Prime and Composite Numbers

Quiz
•
5th Grade
14 questions
Exterior and Interior angles of Polygons

Quiz
•
8th Grade
37 questions
Camp Re-cap Week 1 (no regression)

Quiz
•
9th - 12th Grade
46 questions
Biology Semester 1 Review

Quiz
•
10th Grade