Search Header Logo

Quiz on ARPA Controls

Authored by Codia Isagani

Other

University

Quiz on ARPA Controls
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MATCH QUESTION

1 min • 1 pt

Match the following access control mechanisms with their primary functions.

Restricting access based on permissions.

To restrict access to resources based on user permissions.

Providing chaos in user access.

To enhance user permissions for all resources.

Enhancing permissions for all.

To monitor user activity without restrictions.

Monitoring user activity freely.

To provide unlimited access to all users, which would be chaos.

2.

DRAG AND DROP QUESTION

1 min • 1 pt

A common type of access control mechanism is (a)   .

Attribute-Based Access Control (ABA
Role-Based Access Control (RBAC)
Mandatory Access Control (MAC)
Discretionary Access Control (DAC)

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

How does role-based access control (RBAC) function?

RBAC is based on the user's department.

RBAC requires users to request permissions individually.

RBAC assigns permissions to roles, and users gain access through their assigned roles.

RBAC grants access based on user identity alone.

4.

MATCH QUESTION

1 min • 1 pt

Match the following purposes of data encryption techniques with their descriptions.

To protect data from unauthorized access!

To speed up data processing!

To facilitate secure data transfer!

To give us more room for our data!

To optimize storage capacity!

To keep our sensitive information safe from intruders!

To enhance the efficiency of data handling!

To make sharing data easier!

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which encryption method would you recommend to help your friend Ava secure her secret diary?

RSA (Rivest-Shamir-Adleman)

Blowfish

DES (Data Encryption Standard)

AES (Advanced Encryption Standard)

6.

MATCH QUESTION

1 min • 1 pt

Match the following types of encryption with their characteristics.

Asymmetric encryption is slower than symmetric for large data sizes.

Symmetric encryption uses multiple keys, while asymmetric uses one key.

Symmetric encryption is faster than asymmetric for data encryption.

Asymmetric encryption is faster than symmetric for all data sizes.

Symmetric encryption is used for both data encryption and digital signatures.

Symmetric encryption uses one key, while asymmetric uses a key pair.

Asymmetric encryption uses two keys for secure communication.

Symmetric encryption is only for digital signatures, while asymmetric is for data encryption.

7.

DROPDOWN QUESTION

1 min • 1 pt

A common user authentication method that uses a password is (a)   .

Biometric authentication
Single sign-on authentication
Two-factor authentication
Username and password authenticatio

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?