#1
Which of the following is NOT a commonly used access control model?
Role-Based Access Control (RBAC)
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Hierarchical Access Control (HAC)
#2
Which of the following is an example of an access control mechanism used to restrict access based on time of day?
Role-Based Access Control (RBAC)
Discretionary Access Control (DAC)
Rule-Based Access Control (RBAC)
Time-Based Access Control (TBAC)
#3
What is the main purpose of Access Control Lists (ACLs) in the context of computer security?
To track user login attempts
To manage user access to system resources
To encrypt sensitive data
To monitor network traffic
#4
Which of the following authentication factors typically relies on something the user knows?
Biometric
Token
Knowledge-based
Location-based
#5
What is the primary purpose of access control in information systems?
To restrict access to authorized users only
To grant unlimited access to all users
To monitor user activity
To slow down system performance
#6
What does the principle of least privilege suggest?
Users should have minimal access rights necessary to perform their duties
Users should have unlimited access rights to prevent any issues
Users should be granted access rights based on their job titles only
Users should have access rights based on their seniority in the organization
#7
Which authentication factor relies on physical characteristics unique to an individual?
Biometric
Knowledge-based
Token
Location-based
#8
In the context of user management, what is the purpose of the term 'deprovisioning'?
Granting access to resources
Removing access to resources
Monitoring user activities
Logging user login attempts
#9
What is the purpose of an access control matrix?
To store user passwords securely
To visualize and manage access rights
To encrypt sensitive data
To authenticate users
#10
Which access control model enforces access based on rules defined by a system administrator or security professional?
Role-Based Access Control (RBAC)
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Rule-Based Access Control (RBAC)
#11
What is the primary purpose of implementing access control lists (ACLs) in network security?
To regulate access to network resources
To encrypt network traffic
To monitor network performance
To install antivirus software
#12
Which of the following is NOT a typical component of user management systems?
User authentication
User authorization
User accounting
User encryption
#13
Which of the following is NOT typically considered a biometric authentication method?
Fingerprint recognition
Facial recognition
Username and password
Iris recognition
#14
What is the purpose of the principle of separation of duties in access control?
To ensure that each user has multiple roles within the system
To ensure that no single user has complete control over all aspects of a process
To restrict access to resources based on user's location
To allow users to access resources at any time
#15
In the context of access control, what is the purpose of a password policy?
To enforce the use of complex passwords
To allow users to share passwords
To eliminate the need for passwords
To store passwords in plain text