Question 1
Which of the following best describes the primary goal of Access Control in cybersecurity?
To monitor user behavior and flag suspicious activities
To define and enforce who is authorized to access what information and resources
To ensure all data is encrypted before transmission
To prevent external attacks from entering the network
Question 2
What does Authorization in an Access Control system primarily determine?
The identity of the user attempting to access a system
What a user is allowed to do once their identity is authenticated
The encryption level required for transmitting data
The process of logging user interactions for auditing
Question 3
Which of the following Access Control models is most appropriate for government and military environments?
Role-Based Access Control (RBAC)
Mandatory Access Control (MAC)
Discretionary Access Control (DAC)
Identity-Based Access Control (IBAC)
Question 4
In the Discretionary Access Control (DAC) model, what can the owner of the resource do?
Grant permissions only to system administrators
Set security policies for system-wide access
Transfer access permissions for resources based on user identity
Prevent system administrators from modifying access permissions
Question 5
Which of the following is not a key feature of Mandatory Access Control (MAC)?
Centralized decision-making for access control
User discretion to grant or modify access permissions
Strict system-enforced security policies
Access based on classification levels or clearance
Question 6
In RBAC (Role-Based Access Control), what determines what resources a user can access?
The role assigned to the user based on job responsibilities
The individual user's personal preferences and history
The clearance level granted by the system administrator
The user’s geographical location or IP address
Question 7
What is a common security risk associated with DAC (Discretionary Access Control)?
Users may not have the necessary access to complete their tasks
It is difficult to audit and track user activity
Users are required to authenticate using multiple factors
It allows users to modify or share permissions, potentially leading to unauthorized access
Question 8
Which authentication technique is most commonly associated with Multi-Factor Authentication (MFA)?
Password and retina scan
Password and security question
Password and one-time code sent to a phone
Password and fingerprint recognition
Question 9
What does Mandatory Access Control (MAC) enforce in terms of resource access?
Access is based on the identity and actions of users
Access is based on security policies and classification levels
Users are granted access according to their role and responsibilities
Users can grant permissions to others based on their personal judgment
There are 9 questions to complete.