Access Control in Computer Security
12 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary function of access control?

  • To manage access to and use of resources by users (correct)
  • To quarantine suspicious files for analysis
  • To detect and remove malware
  • To assign classification or clearance level labels

What does DAC stand for?

  • Data Authentication and Correction
  • Digital Access Control
  • Data Authentication Code
  • Discretionary Access Control (correct)

What is the primary purpose of antivirus software?

  • To detect and remove malicious software (correct)
  • To assign job labels with permissions
  • To control access to system resources
  • To monitor network communications

How does MAC restrict access?

<p>By limiting access to subjects with equal or superior labels (D)</p> Signup and view all the answers

What is necessary to have the best chance of detecting known forms of malware?

<p>Keeping AV software detection databases current (D)</p> Signup and view all the answers

What is the purpose of RBAC?

<p>To control access through job labels with permissions (A)</p> Signup and view all the answers

What is the primary method used by most anti-virus products to detect malicious code?

<p>Pattern recognition or signature matching (B)</p> Signup and view all the answers

What is the term for a security breach that enables an attacker to gain access or control over a system for an extended period of time?

<p>Advanced Persistent Threat (APT) (C)</p> Signup and view all the answers

What is the term for anything that is used in and is necessary to the completion of a business task?

<p>Asset (B)</p> Signup and view all the answers

What is the process of proving an individual is a claimed identity?

<p>Authentication (B)</p> Signup and view all the answers

What is the term for the security mechanism determining and enforcing what authenticated users are authorized to do within a computer system?

<p>Authorization (D)</p> Signup and view all the answers

What is the type of access control that manages access using labels of classification or clearance on both subjects and objects?

<p>Mandatory Access Control (MAC) (C)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser