Quiz on ARPA Controls

Quiz on ARPA Controls

University

30 Qs

quiz-placeholder

Similar activities

Credit Reports

Credit Reports

9th Grade - University

25 Qs

Preventive Cybersecurity Quiz

Preventive Cybersecurity Quiz

12th Grade - University

25 Qs

Big Data & E-Science Long Quiz

Big Data & E-Science Long Quiz

University

35 Qs

 Exam 7-9

Exam 7-9

University

26 Qs

Mobile Device and Security Quiz

Mobile Device and Security Quiz

University

30 Qs

ECE 420 Review

ECE 420 Review

University

30 Qs

Digital Certificates and Security Quiz

Digital Certificates and Security Quiz

University

30 Qs

Nets Week - Basic Firewall

Nets Week - Basic Firewall

10th Grade - Professional Development

25 Qs

Quiz on ARPA Controls

Quiz on ARPA Controls

Assessment

Quiz

Other

University

Hard

Created by

Codia Isagani

FREE Resource

30 questions

Show all answers

1.

MATCH QUESTION

1 min • 1 pt

Match the following access control mechanisms with their primary functions.

Providing chaos in user access.

To monitor user activity without restrictions.

Restricting access based on permissions.

To restrict access to resources based on user permissions.

Enhancing permissions for all.

To enhance user permissions for all resources.

Monitoring user activity freely.

To provide unlimited access to all users, which would be chaos.

2.

DRAG AND DROP QUESTION

1 min • 1 pt

A common type of access control mechanism is (a)   .

Attribute-Based Access Control (ABA
Role-Based Access Control (RBAC)
Mandatory Access Control (MAC)
Discretionary Access Control (DAC)

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

How does role-based access control (RBAC) function?

RBAC is based on the user's department.

RBAC requires users to request permissions individually.

RBAC assigns permissions to roles, and users gain access through their assigned roles.

RBAC grants access based on user identity alone.

4.

MATCH QUESTION

1 min • 1 pt

Match the following purposes of data encryption techniques with their descriptions.

To protect data from unauthorized access!

To speed up data processing!

To enhance the efficiency of data handling!

To give us more room for our data!

To facilitate secure data transfer!

To keep our sensitive information safe from intruders!

To optimize storage capacity!

To make sharing data easier!

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which encryption method would you recommend to help your friend Ava secure her secret diary?

RSA (Rivest-Shamir-Adleman)

Blowfish

DES (Data Encryption Standard)

AES (Advanced Encryption Standard)

6.

MATCH QUESTION

1 min • 1 pt

Match the following types of encryption with their characteristics.

Symmetric encryption is faster than asymmetric for data encryption.

Asymmetric encryption is faster than symmetric for all data sizes.

Asymmetric encryption uses two keys for secure communication.

Symmetric encryption uses multiple keys, while asymmetric uses one key.

Asymmetric encryption is slower than symmetric for large data sizes.

Symmetric encryption is only for digital signatures, while asymmetric is for data encryption.

Symmetric encryption is used for both data encryption and digital signatures.

Symmetric encryption uses one key, while asymmetric uses a key pair.

7.

DROPDOWN QUESTION

1 min • 1 pt

A common user authentication method that uses a password is (a)   .

Biometric authentication
Single sign-on authentication
Two-factor authentication
Username and password authenticatio

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?