#1
Which of the following is NOT a commonly used access control model?
Role-Based Access Control (RBAC)
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Hierarchical Access Control (HAC)
#2
Which of the following is an example of an access control mechanism used to restrict access based on time of day?
Role-Based Access Control (RBAC)
Discretionary Access Control (DAC)
Rule-Based Access Control (RBAC)
Time-Based Access Control (TBAC)
#3
What is the main purpose of Access Control Lists (ACLs) in the context of computer security?
To track user login attempts
To manage user access to system resources
To encrypt sensitive data
To monitor network traffic
#4
Which of the following authentication factors typically relies on something the user knows?
Biometric
Token
Knowledge-based
Location-based
#5
What is the primary purpose of access control in information systems?
To restrict access to authorized users only
To grant unlimited access to all users
To monitor user activity
To slow down system performance
#6
Which of the following is an example of a physical access control mechanism?
Biometric authentication
Password authentication
Token authentication
Firewall
#7
Which of the following is an example of a common access control mechanism in Unix-like operating systems?
NTFS permissions
SELinux
UAC
File permissions
#8
What is the purpose of the principle of 'least privilege' in access control?
To give users unlimited access to resources
To grant access to resources based on user's job title
To give users the minimum access rights necessary to perform their tasks
To allow users to have multiple access privileges
#9
What does the principle of least privilege suggest?
Users should have minimal access rights necessary to perform their duties
Users should have unlimited access rights to prevent any issues
Users should be granted access rights based on their job titles only
Users should have access rights based on their seniority in the organization
#10
Which authentication factor relies on physical characteristics unique to an individual?
Biometric
Knowledge-based
Token
Location-based
#11
In the context of user management, what is the purpose of the term 'deprovisioning'?
Granting access to resources
Removing access to resources
Monitoring user activities
Logging user login attempts
#12
What is the purpose of an access control matrix?
To store user passwords securely
To visualize and manage access rights
To encrypt sensitive data
To authenticate users
#13
Which access control model enforces access based on rules defined by a system administrator or security professional?
Role-Based Access Control (RBAC)
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Rule-Based Access Control (RBAC)
#14
What is the primary purpose of multi-factor authentication (MFA)?
To grant access based on user roles
To verify the identity of a user using multiple credentials
To restrict access to specific locations
To monitor user activity
#15
What is the primary purpose of role-based access control (RBAC)?
To grant access based on physical location
To grant access based on user's job function or role
To grant access based on time of day
To grant access based on user's seniority
#16
What is the term used to describe the process of managing user identities across various systems and applications?
Identity theft
User authentication
User provisioning
Single sign-on
#17
What is the primary objective of implementing access controls in information systems?
To increase system performance
To minimize security risks
To eliminate user authentication
To improve user experience
#18
What is the difference between mandatory access control (MAC) and discretionary access control (DAC)?
MAC grants access based on user's job role, while DAC grants access based on user's discretion.
MAC is more flexible than DAC in granting access permissions.
MAC is based on rules set by system administrators, while DAC is based on user's discretion.
DAC is more secure than MAC in controlling access to resources.
#19
Which of the following is an example of a biometric authentication method?
Username and password
Smart card
Fingerprint recognition
Token
#20
What is the primary function of an access control list (ACL) in computer networks?
To manage network bandwidth
To control user access to network resources
To monitor network traffic
To encrypt data transmission
#21
What is the primary purpose of implementing access control lists (ACLs) in network security?
To regulate access to network resources
To encrypt network traffic
To monitor network performance
To install antivirus software
#22
Which of the following is NOT a typical component of user management systems?
User authentication
User authorization
User accounting
User encryption
#23
Which of the following is NOT typically considered a biometric authentication method?
Fingerprint recognition
Facial recognition
Username and password
Iris recognition
#24
What is the purpose of the principle of separation of duties in access control?
To ensure that each user has multiple roles within the system
To ensure that no single user has complete control over all aspects of a process
To restrict access to resources based on user's location
To allow users to access resources at any time
#25
In the context of access control, what is the purpose of a password policy?
To enforce the use of complex passwords
To allow users to share passwords
To eliminate the need for passwords
To store passwords in plain text