Network Security Topic 3

Network Security Topic 3

University

10 Qs

quiz-placeholder

Similar activities

Keamanan Sistem Operasi Linux

Keamanan Sistem Operasi Linux

University

10 Qs

CID - Access COntrol

CID - Access COntrol

University

10 Qs

Introduction to windows server 2016

Introduction to windows server 2016

University

15 Qs

Security+

Security+

University

15 Qs

Chapter 7: User Access

Chapter 7: User Access

University

10 Qs

SecureSphere (EPITA): Security models (IT Security Management - Day 5)

SecureSphere (EPITA): Security models (IT Security Management - Day 5)

University

10 Qs

Introduction to MS Access 2013

Introduction to MS Access 2013

7th Grade - University

10 Qs

ASI 4

ASI 4

University

15 Qs

Network Security Topic 3

Network Security Topic 3

Assessment

Quiz

Computers

University

Easy

Created by

Fathin Aziz

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of access control?

To reduce hardware costs

To enhance user experience

To control who has access to information

To increase network speed

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the context of access control, what does 'subject' refer to?

An active entity like a user or process

A passive entity like a file

A security vulnerability

A type of access control model

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an Access Control List (ACL) used for?

To specify access permissions for subjects

To encrypt data

To monitor network traffic

To create user accounts

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access control model requires formal matching of authorizations to object sensitivity?

Role-Based Access Control (RBAC)

Non-Discretionary Access Control (NDAC)

Mandatory Access Control (MAC)

Discretionary Access Control (DAC)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key disadvantage of Discretionary Access Control (DAC)?

It is difficult to implement

It can lead to inadvertent changes

It requires custom operating systems

It does not allow for auditing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does Role-Based Access Control (RBAC) primarily focus on?

User's personal preferences

User's role in the organization

User's geographical location

User's historical access patterns

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a technical control?

Security awareness training

Background checks

Encryption

Policy creation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?