Access Control Lecture 3 Concepts

RemarkableForsythia avatar
RemarkableForsythia
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

In MAC, administrators of the system have the authority to change the object level.

True

RBAC model makes access decisions based on user roles within an organization.

True

Operating systems prevent one user from accessing another user's files.

True

Top Secret (TS) is the lowest classification level in MAC.

<p>False</p> Signup and view all the answers

In RBAC, access decisions are made based on user identities rather than roles.

<p>False</p> Signup and view all the answers

Web browsers have no capability to control the kinds of content users can view.

<p>False</p> Signup and view all the answers

Access control specifies what users on a system can or cannot do.

<p>True</p> Signup and view all the answers

In Access Control, subjects are passive entities requesting accesses to resources.

<p>False</p> Signup and view all the answers

Role Based Access Control (RBAC) is one of the Access Control Models mentioned in the text.

<p>True</p> Signup and view all the answers

In Discretionary Access Control (DAC), the owner of the resource does not have the ability to specify what subjects can access specific resources.

<p>False</p> Signup and view all the answers

The DAC model allows users to protect what they own and define the type of access given to others.

<p>True</p> Signup and view all the answers

Access Control Lists (ACLs) are the least common implementation of DAC.

<p>False</p> Signup and view all the answers

More Quizzes Like This

Access Control Lecture 3 Quiz
12 questions
Logical Access Control Systems
40 questions

Logical Access Control Systems

ExcitingRhodonite3899 avatar
ExcitingRhodonite3899
Use Quizgecko on...
Browser
Browser