
Quiz on ARPA Controls
Authored by Codia Isagani
Other
University

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MATCH QUESTION
1 min • 1 pt
Match the following access control mechanisms with their primary functions.
Enhancing permissions for all.
To provide unlimited access to all users, which would be chaos.
Restricting access based on permissions.
To enhance user permissions for all resources.
Monitoring user activity freely.
To restrict access to resources based on user permissions.
Providing chaos in user access.
To monitor user activity without restrictions.
2.
DRAG AND DROP QUESTION
1 min • 1 pt
A common type of access control mechanism is (a) .
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
How does role-based access control (RBAC) function?
RBAC is based on the user's department.
RBAC requires users to request permissions individually.
RBAC assigns permissions to roles, and users gain access through their assigned roles.
RBAC grants access based on user identity alone.
4.
MATCH QUESTION
1 min • 1 pt
Match the following purposes of data encryption techniques with their descriptions.
To protect data from unauthorized access!
To keep our sensitive information safe from intruders!
To enhance the efficiency of data handling!
To speed up data processing!
To optimize storage capacity!
To make sharing data easier!
To facilitate secure data transfer!
To give us more room for our data!
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which encryption method would you recommend to help your friend Ava secure her secret diary?
RSA (Rivest-Shamir-Adleman)
Blowfish
DES (Data Encryption Standard)
AES (Advanced Encryption Standard)
6.
MATCH QUESTION
1 min • 1 pt
Match the following types of encryption with their characteristics.
Asymmetric encryption is slower than symmetric for large data sizes.
Asymmetric encryption is faster than symmetric for all data sizes.
Symmetric encryption is faster than asymmetric for data encryption.
Symmetric encryption uses multiple keys, while asymmetric uses one key.
Symmetric encryption is used for both data encryption and digital signatures.
Symmetric encryption is only for digital signatures, while asymmetric is for data encryption.
Asymmetric encryption uses two keys for secure communication.
Symmetric encryption uses one key, while asymmetric uses a key pair.
7.
DROPDOWN QUESTION
1 min • 1 pt
A common user authentication method that uses a password is (a) .
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?