
ACI Sec+ Midweek

Quiz
•
Computers
•
12th Grade
•
Hard
Pat Johnson
FREE Resource
75 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which term does NOT represent a pillar of cybersecurity?
Authentication
Confidentiality
Availability
Integrity
Answer explanation
The term 'Confidentiality' does NOT represent a pillar of cybersecurity. The pillars are Authentication, Availability, and Integrity.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What concept establishes that the parties involved in an action or event cannot deny having been involved?
Authorization
Non-repudiation
Zero Trust
Honeypot
Answer explanation
Non-repudiation establishes that the parties involved cannot deny their participation in an action or event, ensuring accountability and trustworthiness.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which access control method is described by resource owners having the authority to grant or deny access to other users?
RBAC
ABAC
MAC
DAC
Answer explanation
The access control method described by resource owners having the authority to grant or deny access to other users is DAC (Discretionary Access Control). In DAC, users have control over their resources and can decide who can access them.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What physical access control method prevents tailgating by ensuring only one individual at a time can authenticate and be granted physical access through a barrier?
Policy Enforcement Point
Access badge
Access Control Vestibule
Control plane
Answer explanation
The physical access control method that prevents tailgating by ensuring only one individual at a time can authenticate and be granted access through a barrier is the Access Control Vestibule.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which security category focuses on policies, procedures, and overall management of security within an organization?
Managerial
Operational
Technical
Physical
Answer explanation
The security category that focuses on policies, procedures, and overall management of security within an organization is Managerial.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which security category is exemplified by network security, encryption, authentication mechanisms, IDSs, and firewalls?
Managerial
Physical
Technical
Operational
Answer explanation
The correct security category exemplified by network security, encryption, authentication mechanisms, IDSs, and firewalls is Technical.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization posts "No Trespassing" signs. What type of security control is this considered?
Deterrent
Detective
Preventive
Corrective
Answer explanation
The 'No Trespassing' signs act as a deterrent by warning individuals not to trespass, aiming to prevent unauthorized access to the organization's property.
Create a free account and access millions of resources
Similar Resources on Wayground
80 questions
preTEST Pranata Komputer Terampil Part 1

Quiz
•
10th Grade - Professi...
70 questions
Tryout Bag. 4.1

Quiz
•
9th - 12th Grade
75 questions
Computer II

Quiz
•
12th Grade
75 questions
Computer Science Quiz

Quiz
•
9th - 12th Grade
71 questions
Revision

Quiz
•
1st - 12th Grade
74 questions
CompTia all

Quiz
•
12th Grade
80 questions
SEC+ Mod 7 Part 2

Quiz
•
12th Grade
80 questions
NET+ Quiz Part 26

Quiz
•
12th Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade