
Cyber Security Access, Storage, Permissions
Quiz by Robert
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
10 questions
Show answers
- Q1Which of the following is a best practice for managing access permissions in a corporate environment?Share passwords among team membersUse the same password for all accountsGrant all users administrative accessImplement the principle of least privilege30s
- Q2What is a primary purpose of data encryption in cyber security?To protect sensitive information from unauthorized accessTo increase the speed of data transferTo make data universally accessibleTo eliminate the need for user authentication30s
- Q3What does the term 'data sovereignty' refer to in the context of cyber security?The concept that data is subject to the laws of the country in which it is storedThe technique of backing up data in multiple locationsThe process of deleting data permanentlyThe ability to share data freely across borders30s
- Q4In cyber security, what is the primary purpose of regular access reviews?To create new user accountsTo install software updatesTo monitor network trafficTo ensure that users have appropriate access rights30s
- Q5What is the main advantage of using multi-factor authentication (MFA) in access control?It adds an extra layer of security beyond just a passwordIt allows unlimited access to all usersIt simplifies the login processIt eliminates the need for passwords30s
- Q6What is the purpose of user activity logging in cyber security?To simplify the user interfaceTo track and monitor user actions for security and compliance purposesTo increase system performanceTo limit user internet access30s
- Q7What is the primary role of data classification in cyber security?To categorize data based on its sensitivity and the impact of unauthorized accessTo eliminate unnecessary dataTo standardize file formatsTo speed up data processing30s
- Q8Which type of access control restricts user permissions based on characteristics such as role or job function?Time-Based Access ControlDiscretionary Access Control (DAC)Mandatory Access Control (MAC)Role-Based Access Control (RBAC)30s
- Q9What is the primary function of a Firewall in cyber security?To encrypt all communication between devicesTo monitor and control incoming and outgoing network trafficTo manage user access permissionsTo store sensitive data securely30s
- Q10What is the main purpose of a data breach response plan?To create backups of sensitive dataTo outline the steps to take in the event of a data breachTo improve system performanceTo track user login times30s