Decentralized Access Control (DAC) Model and ACLs Quiz
22 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is the best definition of access control?

  • The act of managing who enters a property and at what time
  • The act of installing electronic hardware to control access to a property
  • The act of using technology to control access to a property
  • The act of maintaining building security by strategically controlling who can access your property and when (correct)

Which type of access control model is more suitable for commercial properties and businesses?

  • Less common access control models
  • Access control models with high traffic
  • Basic access control models
  • Strict access control models (correct)

What is the purpose of access control?

  • To provide advanced security features
  • To restrict access to a property
  • To manage who enters a property and at what time (correct)
  • To control the technology used in a property

Which access control model decentralizes security decisions and allows administrators and resource owners to give access to users at specified levels?

<p>DAC (C)</p> Signup and view all the answers

In which access control model are access permissions assigned based on the organizational roles rather than individual user accounts?

<p>RBAC (A)</p> Signup and view all the answers

Which access control model applies a multitude of attributes to both users and resources, allowing decisions to be made according to context and evolving levels of risk?

<p>ABAC (C)</p> Signup and view all the answers

Which access control model combines the power of both RBAC and ABAC for a security boost and eases the burden on administrative teams?

<p>StrongDM (A)</p> Signup and view all the answers

Which access control system is recommended for businesses with smaller applications?

<p>DAC (A)</p> Signup and view all the answers

Which access control system combines Windows DAC system ACLs with integrity levels to create a MAC environment?

<p>MAC (C)</p> Signup and view all the answers

What is the criteria for accessing an object under the access control system described in the text?

<p>Having the same level of trust as the object (D)</p> Signup and view all the answers

Which of the following access control models grants access permissions based on the role of the user within an organization?

<p>Discretionary access control (DAC) (B)</p> Signup and view all the answers

Which access control model is commonly used by government agencies and financial institutions to highly control and trace access to confidential areas and data?

<p>Mandatory access control (MAC) (A)</p> Signup and view all the answers

Which access control model allows any user granted access permissions to edit and share those permissions with other members of an organization?

<p>Discretionary access control (DAC) (A)</p> Signup and view all the answers

Which access control model grants permissions based on the evaluated attributes or characteristics of the employee, rather than only their specific role?

<p>Attribute-based access control (ABAC) (A)</p> Signup and view all the answers

Which of the following is an example of a Discretionary Access Control (DAC) system?

<p>Using access control lists (ACLs) and capability tables (D)</p> Signup and view all the answers

What is the main purpose of Role Based Access Control (RBAC)?

<p>To assign access rights based on organizational roles (D)</p> Signup and view all the answers

Which type of access control system is considered the strictest?

<p>Mandatory Access Control (MAC) (C)</p> Signup and view all the answers

What is the purpose of security labels in a Mandatory Access Control (MAC) system?

<p>To determine access based on security labels (C)</p> Signup and view all the answers

Which access control model allows for multiple administrators to control access to a property?

<p>Discretionary access control (DAC) (C)</p> Signup and view all the answers

Which access control model is best used for businesses that emphasize security and confidentiality and features only one system administrator?

<p>Mandatory access control (MAC) (B)</p> Signup and view all the answers

Which access control model assigns every user a specific role that has unique access permissions?

<p>Role-based access control (RBAC) (A)</p> Signup and view all the answers

Which access control model changes a user's access permissions based on qualifying factors such as the time of day?

<p>Rule-based access control (RuBAC) (B)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser