IDAM and Network Architecture

IDAM and Network Architecture

11th Grade

30 Qs

quiz-placeholder

Similar activities

Cybersecurity Quiz 2

Cybersecurity Quiz 2

10th Grade - University

25 Qs

Microsoft Certification Device Configuration and Management

Microsoft Certification Device Configuration and Management

11th Grade - University

28 Qs

L2 ICT U1 Protecting Data Quiz

L2 ICT U1 Protecting Data Quiz

11th Grade

29 Qs

OCR Computer Science 1.3.1a

OCR Computer Science 1.3.1a

9th - 11th Grade

25 Qs

LATIHAN EXAM CCCNA 280-315

LATIHAN EXAM CCCNA 280-315

11th Grade

35 Qs

Impact of the Internet (IGCSE)

Impact of the Internet (IGCSE)

10th - 11th Grade

27 Qs

Data Risks

Data Risks

10th - 12th Grade

26 Qs

Year 7 Computer Science Baseline

Year 7 Computer Science Baseline

KG - Professional Development

31 Qs

IDAM and Network Architecture

IDAM and Network Architecture

Assessment

Quiz

Computers

11th Grade

Easy

Created by

Carlos Sowell

Used 5+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the term for the process of validating a subject's identity?

Authentication

Auditing

Identification

Authorization

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee traveling in Europe for vacation submitted a ticket as they could not access their work email. Which policy does the company use?

Password management

Location-based authentication

Multi-factor authentication

Password age

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A contractor only works for a company from 9 a.m. to 12 p.m. What kind of restriction could the company set up on the contractor's account to prevent using it outside that range?

Time-based restrictions

Password restrictions

Location-based restrictions

Mandatory access control

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What MFA philosophy uses knowledge factors and includes passphrases to gain access to systems?

Something you have

Somewhere you are

Something you are

Something you know

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of password is maryhadalittlelamb?

Cognitive

Passphrase

Static

Composition

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security principle are you complying with when you assign access permissions so that users can only access the resources required to accomplish their specific work tasks?

Need to know

Cross-training

Job rotation

Principle of least privilege

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which form of access control environment is access controlled by rules rather than identity?

Discretionary access control (DAC)

Most client-server environments

Access control list (ACL)

Mandatory access control (MAC)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?