Quiz Access Control

Quiz Access Control

University

30 Qs

quiz-placeholder

Similar activities

IT Concepts 2

IT Concepts 2

12th Grade - University

25 Qs

Teknik komputer dan jaringan

Teknik komputer dan jaringan

9th Grade - University

25 Qs

Network + Domain 4: IT Security Concepts Quiz

Network + Domain 4: IT Security Concepts Quiz

University

25 Qs

EVALUAC DE CONOC INTRO TEMA3 CIBERSE

EVALUAC DE CONOC INTRO TEMA3 CIBERSE

University

26 Qs

Quiz tentang Sharing Data dalam Jaringan

Quiz tentang Sharing Data dalam Jaringan

11th Grade - University

25 Qs

Grade 7 Storage Quiz

Grade 7 Storage Quiz

7th Grade - University

25 Qs

Web 2.0 and ICT Projects Quiz

Web 2.0 and ICT Projects Quiz

11th Grade - University

25 Qs

Java Programming Quiz 1

Java Programming Quiz 1

University

25 Qs

Quiz Access Control

Quiz Access Control

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Yudhistira Nugraha

Used 1+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A multinational company experienced data leakage due to unauthorized file sharing among departments. Which principle of access control was most likely violated?

Separation of Duties

Need-to-Know Principle

Least Privilege

Accountability

Data Provenance

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a government agency, employees can only access the citizen database during office hours and within the building network. Which control mechanism ensures this restriction?

Discretionary Access Control

Temporal Access Policy

Context-Aware Access Control

Role-Based Authorization

Multi-tenant Segmentation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A healthcare application encrypts patient data but fails to log who accessed it. Which access control principle is missing?

Confidentiality

Authorization

Availability

Accountability

Non-repudiation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a university e-learning system, a student (subject) attempts to modify exam results stored in a gradebook (object). Which access right should prevent this?

Read-only privilege

Write privilege

Ownership right

Execute privilege

Delegation right

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A smart home system allows multiple users to control the same thermostat. The system must differentiate between who requested and who authorized the action. This distinction reflects:

User hierarchy

Subject-object mapping

Trust delegation

Functional dependency

Process inheritance

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cloud database administrator grants a temporary data scientist access to a specific dataset but not the schema or configuration files. This illustrates:

Role inheritance

Fine-grained object control

Coarse-grained delegation

Hybrid privilege escalation

Function-based segregation

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A startup allows employees to set permissions for files they create. Later, one intern accidentally exposes sensitive client data publicly. What is the main weakness of DAC shown here?

Centralized enforcement

User-dependent control

Context-insensitive policies

Hierarchical assignment

Over-classification of data

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?