Podcast
Questions and Answers
In MAC, administrators of the system have the authority to change the object level.
In MAC, administrators of the system have the authority to change the object level.
True
RBAC model makes access decisions based on user roles within an organization.
RBAC model makes access decisions based on user roles within an organization.
True
Operating systems prevent one user from accessing another user's files.
Operating systems prevent one user from accessing another user's files.
True
Top Secret (TS) is the lowest classification level in MAC.
Top Secret (TS) is the lowest classification level in MAC.
Signup and view all the answers
In RBAC, access decisions are made based on user identities rather than roles.
In RBAC, access decisions are made based on user identities rather than roles.
Signup and view all the answers
Web browsers have no capability to control the kinds of content users can view.
Web browsers have no capability to control the kinds of content users can view.
Signup and view all the answers
Access control specifies what users on a system can or cannot do.
Access control specifies what users on a system can or cannot do.
Signup and view all the answers
In Access Control, subjects are passive entities requesting accesses to resources.
In Access Control, subjects are passive entities requesting accesses to resources.
Signup and view all the answers
Role Based Access Control (RBAC) is one of the Access Control Models mentioned in the text.
Role Based Access Control (RBAC) is one of the Access Control Models mentioned in the text.
Signup and view all the answers
In Discretionary Access Control (DAC), the owner of the resource does not have the ability to specify what subjects can access specific resources.
In Discretionary Access Control (DAC), the owner of the resource does not have the ability to specify what subjects can access specific resources.
Signup and view all the answers
The DAC model allows users to protect what they own and define the type of access given to others.
The DAC model allows users to protect what they own and define the type of access given to others.
Signup and view all the answers
Access Control Lists (ACLs) are the least common implementation of DAC.
Access Control Lists (ACLs) are the least common implementation of DAC.
Signup and view all the answers