Implementing Host Security & Access Controls in Industrial Networks


Choose an answer and hit 'next'. You will receive your score and answers at the end.

question 1 of 3

Which of the following refers to methods used to ensure that only authorized individuals have access to specific resources in a network?

Create Your Account To Take This Quiz

As a member, you'll also get unlimited access to over 79,000 lessons in math, English, science, history, and more. Plus, get practice tests, quizzes, and personalized coaching to help you succeed.

Try it risk-free
Try it risk-free for 30 days. Cancel anytime
Already registered? Log in here for access

1. Which of the following is NOT an example of host security?

2. Which of the following best defines HIDS?

Create your account to access this entire worksheet
A Premium account gives you access to all lesson, practice exams, quizzes & worksheets
Access to all video lessons
Quizzes, practice exams & worksheets
Certificate of Completion
Access to instructors
Create an account to get started Create Account

About This Quiz & Worksheet

Cyber attacks against industrial networks can be mitigated using security methods and controls. You will be quizzed on ways access is restricted from unauthorized individuals.

Quiz & Worksheet Goals

This quiz will test you on the following topics:

  • The method used to restrict access to specific resources from unauthorized individuals
  • Some examples of host security
  • Description of HIDS
  • Why biometrics are sometimes preferred over other access methods
  • A method used to prevent access to secure areas

Skills Practiced

  • Defining key concepts- ensure that you can accurately define Host-Based Intrusion Detection System (HIDS)
  • Distinguishing differences- compare and contrast the use of biometrics over pins and passcodes for access
  • Information recall- access the knowledge you've gained regarding host security and physical security

Additional Learning

To learn more about host security and access controls implementation, review the accompanying lesson called Implementing Host Security & Access Controls in Industrial Networks. This lesson addresses the following:

  • The use of access controls to defend critical systems
  • Maintaining the systems with updates
  • Methods used to assure access is restricted to authorized persons