Week 2 Quiz 2 Security Principles

Week 2 Quiz 2 Security Principles

University

10 Qs

quiz-placeholder

Similar activities

G12 T3 Written Work 5 - Design Booth and Product/Window Display

G12 T3 Written Work 5 - Design Booth and Product/Window Display

12th Grade - University

15 Qs

QUIZ - CHAPTER 2

QUIZ - CHAPTER 2

University

15 Qs

2. Бази даних. Системи керування базами даних (СКБД). MS Access

2. Бази даних. Системи керування базами даних (СКБД). MS Access

University

15 Qs

ITEC101 - Lesson 1 - Quiz 1

ITEC101 - Lesson 1 - Quiz 1

University

15 Qs

ICT Interaction Quiz

ICT Interaction Quiz

University

15 Qs

SACOMBANK

SACOMBANK

University

10 Qs

LINKS Cyber Youth Challenge - Round 1

LINKS Cyber Youth Challenge - Round 1

University

10 Qs

Ethics - Week 5 Revision

Ethics - Week 5 Revision

University

10 Qs

Week 2 Quiz 2 Security Principles

Week 2 Quiz 2 Security Principles

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Nasser Hilla

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the principle that advocates for giving users and processes only the minimum privileges needed to perform their functions?

Role-Based Access Control (RBAC)

Fail-Safe Defaults

Principle of Least Privilege (PoLP)

Defense in Depth

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the presentation, what is the core concept of "Fail-Safe Defaults"?

Systems should be configured to be open by default.

Users should be able to disable security features easily.

Systems should default to a secure state when there's uncertainty or a failure.

All traffic should be allowed unless a threat is detected.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Role-Based Access Control (RBAC) simplifies privilege management by assigning permissions based on what?

Individual user names

The time of day a user logs in

A user's specific role within an organization

The type of device a user is using

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does the Principle of Least Privilege (PoLP) help to reduce the attack surface of systems?

By granting all users full access to all systems.

By limiting the damage an attacker can cause if they compromise a low-privileged account.

By allowing regular users to install software.

By defaulting systems to an insecure state.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company's new file server is configured to block all inbound and outbound network traffic by default. The administrator must then create specific rules to allow necessary services like HTTP and SSH. This configuration is an example of which secure design principle?

Defense in Depth

Principle of Least Privilege (PoLP)

Role-Based Access Control (RBAC)

Fail-Safe Defaults

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A large corporation has different levels of employees: Admins, HR staff, and Finance Team members. The company uses a system that automatically grants access to specific files and applications based on these defined job functions. This approach is an effective implementation of which security concept?

Fail-Safe Defaults

Principle of Least Privilege (PoLP)

Role-Based Access Control (RBAC)

The MSR model

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A software development team is creating a new application. They decide to design the application so that if a component fails, it will stop all operations until the issue is resolved, rather than continuing to run in a potentially vulnerable state. By adopting this approach, which security principle are they prioritizing?

Role-Based Access Control (RBAC)

Principle of Least Privilege (PoLP)

Fail-Safe Defaults

Defense in Depth

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?