Guide & Practice Questions
What is Access Control? – Answer ✅️
✅The
️ process by which a system
determines who can use a resource and how
______ are implemented at the discretion of the data user. – Answer
✅️ ✅Discretionary
️ Access Controls (DACs)
______ are enforced by a central authority rather than by individual users. –
Answer ✅️ ✅Nondiscretionary
️ Access Controls (NDACs)
A form of mandatory access control that uses a matrix to specify user
permissions is called ______. – Answer ✅️
✅Lattice-based
️ access controls
(LBACs)
In ______, access privileges are determined by the specific roles users have
within an organization. – Answer ✅️ ✅Role-based
️ access controls (RBACs)
A ______ is a set of characters derived from a phrase to facilitate memory
recall for authentication purposes. – Answer ✅️ ✅virtual
️ password
______ involves assigning classifications to both information and users,
dictating their level of access. – Answer ✅️ ✅mandatory
️ access control (MAC)
______ determines user permissions based on user or system attributes. –
Answer ✅️ ✅attribute-based
️ access control (ABACs)
,The use of multiple methods of verification to establish user identity is
known as ______. – Answer ✅️✅strong
️ authentication
A series of characters known only to the user, serving as proof of identity for
system access, is called a ______. – Answer ✅️✅password
️
What does the False Reject Rate (FRR) measure in biometric access controls?
a. The time it takes to authenticate a user
b. The effectiveness of the biometric system
c. The rate at which authentic users are denied access
d. The rate at which unauthorized users are granted access – Answer ✅️
✅c.
️
The rate at which authentic users are denied access
The process of mapping a user’s real identity to a single digital identity used
across multiple systems is known as:
a. Lattice-based access control
b. Single sign-on (SSO)
c. Multifactor authentication
d. Role-based access control – Answer ✅️
✅b.
️Single sign-on (SSO)
True or False: Virtual Private Networks (VPNs) use encryption to secure data
transmitted over unsecured networks.
a. True
b. False – Answer ✅️
✅a.
️True
,What is the role of a proxy server in network security?
a. To intercept requests for information from external users
b. To increase network speed
c. To encrypt data packets
d. To distribute network traffic evenly – Answer ✅️
✅a.
️To intercept requests
for information from external users
Virtual Private Networks (VPNs) provide which of the following?
a. A firewall to prevent unauthorized access to a network
b. A method to increase internet speed
c. A private and secure connection over a public network
d. A way to bypass internet censorship without encryption – Answer ✅️
✅c.
️A
private and secure connection over a public network
A firewall that can dynamically adapt its rules to handle unexpected and
emergent network traffic is known as:
a. Unified Threat Management (UTM)
b. Dynamic packet filtering
c. Application layer proxy
d. Static packet filtering – Answer ✅️
✅b.
️Dynamic packet filtering
Which type of access control assigns users a matrix of authorizations for
particular areas of access?
a. Discretionary Access Controls (DACs)
, b. Role-Based Access Control (RBAC)
c. Lattice-Based Access Controls (LDACs)
d. Mandatory Access Control (MAC) – Answer ✅️
✅c.
️Lattice-Based Access
Controls (LDACs)
Which of the following is considered a ‘something you have’ authentication
factor?
a. A biometric fingerprint
b. A password
c. A smart card
d. A voice pattern – Answer ✅️
✅c.
️A smart card
Which firewall category operates at the Media Access Control sublayer of the
data link layer?
a. Stateful packet inspection (SPI) firewall
b. Packet-filtering firewall
c. Media access control layer firewall
d. Application layer proxy firewall – Answer ✅️
✅c.
️Media access control layer
firewall
Which type of access controls are implemented at the discretion of the data
user?
a. Nondiscretionary Access Controls (NDACs)
b. Discretionary Access Controls (DACs)
c. Lattice-Based Access Controls (LDACs)