Search Header Logo

Quiz on ARPA Controls

Authored by Codia Isagani

Other

University

Quiz on ARPA Controls
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MATCH QUESTION

1 min • 1 pt

Match the following access control mechanisms with their primary functions.

Enhancing permissions for all.

To provide unlimited access to all users, which would be chaos.

Restricting access based on permissions.

To enhance user permissions for all resources.

Monitoring user activity freely.

To restrict access to resources based on user permissions.

Providing chaos in user access.

To monitor user activity without restrictions.

2.

DRAG AND DROP QUESTION

1 min • 1 pt

A common type of access control mechanism is (a)   .

Attribute-Based Access Control (ABA
Role-Based Access Control (RBAC)
Mandatory Access Control (MAC)
Discretionary Access Control (DAC)

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

How does role-based access control (RBAC) function?

RBAC is based on the user's department.

RBAC requires users to request permissions individually.

RBAC assigns permissions to roles, and users gain access through their assigned roles.

RBAC grants access based on user identity alone.

4.

MATCH QUESTION

1 min • 1 pt

Match the following purposes of data encryption techniques with their descriptions.

To protect data from unauthorized access!

To keep our sensitive information safe from intruders!

To enhance the efficiency of data handling!

To speed up data processing!

To optimize storage capacity!

To make sharing data easier!

To facilitate secure data transfer!

To give us more room for our data!

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which encryption method would you recommend to help your friend Ava secure her secret diary?

RSA (Rivest-Shamir-Adleman)

Blowfish

DES (Data Encryption Standard)

AES (Advanced Encryption Standard)

6.

MATCH QUESTION

1 min • 1 pt

Match the following types of encryption with their characteristics.

Asymmetric encryption is slower than symmetric for large data sizes.

Asymmetric encryption is faster than symmetric for all data sizes.

Symmetric encryption is faster than asymmetric for data encryption.

Symmetric encryption uses multiple keys, while asymmetric uses one key.

Symmetric encryption is used for both data encryption and digital signatures.

Symmetric encryption is only for digital signatures, while asymmetric is for data encryption.

Asymmetric encryption uses two keys for secure communication.

Symmetric encryption uses one key, while asymmetric uses a key pair.

7.

DROPDOWN QUESTION

1 min • 1 pt

A common user authentication method that uses a password is (a)   .

Biometric authentication
Single sign-on authentication
Two-factor authentication
Username and password authenticatio

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?