• Tutorials
  • Courses
  • Tracks

Cyber Quiz 5

Last Updated :
Discuss
Comments

Question 1

Which of the following best describes the primary goal of Access Control in cybersecurity?

  • To monitor user behavior and flag suspicious activities

  • To define and enforce who is authorized to access what information and resources

  • To ensure all data is encrypted before transmission

  • To prevent external attacks from entering the network

Question 2

What does Authorization in an Access Control system primarily determine?

  • The identity of the user attempting to access a system

  • What a user is allowed to do once their identity is authenticated

  • The encryption level required for transmitting data

  • The process of logging user interactions for auditing

Question 3

Which of the following Access Control models is most appropriate for government and military environments?

  • Role-Based Access Control (RBAC)

  • Mandatory Access Control (MAC)

  • Discretionary Access Control (DAC)

  • Identity-Based Access Control (IBAC)

Question 4

In the Discretionary Access Control (DAC) model, what can the owner of the resource do?

  • Grant permissions only to system administrators

  • Set security policies for system-wide access

  • Transfer access permissions for resources based on user identity

  • Prevent system administrators from modifying access permissions

Question 5

Which of the following is not a key feature of Mandatory Access Control (MAC)?

  • Centralized decision-making for access control

  • User discretion to grant or modify access permissions

  • Strict system-enforced security policies

  • Access based on classification levels or clearance

Question 6

In RBAC (Role-Based Access Control), what determines what resources a user can access?

  • The role assigned to the user based on job responsibilities

  • The individual user's personal preferences and history

  • The clearance level granted by the system administrator

  • The user’s geographical location or IP address

Question 7

What is a common security risk associated with DAC (Discretionary Access Control)?

  • Users may not have the necessary access to complete their tasks

  • It is difficult to audit and track user activity

  • Users are required to authenticate using multiple factors

  • It allows users to modify or share permissions, potentially leading to unauthorized access

Question 8

Which authentication technique is most commonly associated with Multi-Factor Authentication (MFA)?

  • Password and retina scan

  • Password and security question

  • Password and one-time code sent to a phone

  • Password and fingerprint recognition

Question 9

What does Mandatory Access Control (MAC) enforce in terms of resource access?

  • Access is based on the identity and actions of users

  • Access is based on security policies and classification levels

  • Users are granted access according to their role and responsibilities

  • Users can grant permissions to others based on their personal judgment

There are 9 questions to complete.

Take a part in the ongoing discussion