#1
Which of the following is NOT a commonly used access control model?
Hierarchical Access Control (HAC)
ExplanationNot a recognized model for access control.
#2
Which of the following is an example of an access control mechanism used to restrict access based on time of day?
Time-Based Access Control (TBAC)
ExplanationRestricts access based on specific times.
#3
What is the main purpose of Access Control Lists (ACLs) in the context of computer security?
To manage user access to system resources
ExplanationManages and controls user access to resources.
#4
Which of the following authentication factors typically relies on something the user knows?
Knowledge-based
ExplanationRelies on user knowledge for authentication.
#5
What is the primary purpose of access control in information systems?
To restrict access to authorized users only
ExplanationEnsures access only for authorized users.
#6
What does the principle of least privilege suggest?
Users should have minimal access rights necessary to perform their duties
ExplanationMinimize user access to reduce security risks.
#7
Which authentication factor relies on physical characteristics unique to an individual?
Biometric
ExplanationUses unique physical traits for user authentication.
#8
In the context of user management, what is the purpose of the term 'deprovisioning'?
Removing access to resources
ExplanationRevoking user access to system resources.
#9
What is the purpose of an access control matrix?
To visualize and manage access rights
ExplanationVisual representation for managing access.
#10
Which access control model enforces access based on rules defined by a system administrator or security professional?
Rule-Based Access Control (RBAC)
ExplanationEnforces access based on predefined rules.
#11
What is the primary purpose of implementing access control lists (ACLs) in network security?
To regulate access to network resources
ExplanationControl user access to network resources.
#12
Which of the following is NOT a typical component of user management systems?
User encryption
ExplanationEncryption is not a standard user management component.
#13
Which of the following is NOT typically considered a biometric authentication method?
Username and password
ExplanationUsername and password are not biometric methods.
#14
What is the purpose of the principle of separation of duties in access control?
To ensure that no single user has complete control over all aspects of a process
ExplanationPrevents concentration of control in one user.
#15
In the context of access control, what is the purpose of a password policy?
To enforce the use of complex passwords
ExplanationEnsures usage of strong and complex passwords.