Unit 2: Securing Servers and Devices

Unit 2: Securing Servers and Devices

9th - 12th Grade

15 Qs

quiz-placeholder

Similar activities

Operating and application systems

Operating and application systems

12th Grade - University

10 Qs

Mobile Devices and Networking Concepts Quiz

Mobile Devices and Networking Concepts Quiz

12th Grade

15 Qs

JARINGAN KOMPUTER DAN INTERNET - KELAS X - INFORMATIKA SEMESTER

JARINGAN KOMPUTER DAN INTERNET - KELAS X - INFORMATIKA SEMESTER

10th Grade

15 Qs

Identity and Access Management Quiz

Identity and Access Management Quiz

12th Grade

15 Qs

NF: Unit 2 Review

NF: Unit 2 Review

10th Grade

15 Qs

Uji Pengetahuan Keamanan Data

Uji Pengetahuan Keamanan Data

9th Grade

10 Qs

Data Security

Data Security

12th Grade - University

17 Qs

ICS Total Recall Review

ICS Total Recall Review

10th Grade

20 Qs

Unit 2: Securing Servers and Devices

Unit 2: Securing Servers and Devices

Assessment

Quiz

Information Technology (IT)

9th - 12th Grade

Medium

Created by

Benji Loh

Used 17+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which access control model is based on the concept of granting access based on job roles or functions?
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Attribute-Based Access Control (ABAC)

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

In which access control model does the data owner determine who can access specific data?
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Rule-Based Access Control (RBAC)

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which access control model is typically used in government and military environments where security is paramount?
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Attribute-Based Access Control (ABAC)

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Group Policy can be used to:

Restrict access to specific programs

Configure network settings

Install software

All of the above

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A specific homepage for all users can be enforced through:

User configuration

Software installation

Group Policy

Registry settings

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

To run scripts on computer startup or shutdown, you would use:

Group Policy Startup/Shutdown scripts

Task Scheduler

Registry settings

Command Prompt

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Group Policy can be used to:

Control user interface customization

Enforce security settings

Manage software updates

All of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?