Information Assurance and Software Security Quiz
5 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of access control leaves a certain amount of control to the discretion of the owner of an object?

  • Commercial access control (CAC)
  • Mandatory access control (MAC)
  • Discretionary access control (DAC) (correct)
  • Hierarchical access control (HAC)
  • Which operating systems use Discretionary Access Controls (DAC) to facilitate accounting and auditing functions?

  • Linux and macOS
  • Windows 95 and Solaris
  • iOS and Android
  • Windows NT and UNIX (correct)
  • What is the basis of the military policy of security?

  • Need-to-know (correct)
  • Need-to-remember
  • Need-to-share
  • Need-to-destroy
  • What does the military model of information security define information security in terms of?

    <p>Confidentiality</p> Signup and view all the answers

    What type of policy does a central authority determine what information is to be accessible and by whom?

    <p>Mandatory access control (MAC)</p> Signup and view all the answers

    Study Notes

    Access Control Models

    • Discretionary Access Control (DAC) leaves a certain amount of control to the discretion of the owner of an object.

    Operating Systems and DAC

    • Unix and Windows NT operating systems use Discretionary Access Controls (DAC) to facilitate accounting and auditing functions.

    Military Policy of Security

    • The basis of the military policy of security is the concept of confidentiality, integrity, and availability.

    Military Model of Information Security

    • The military model of information security defines information security in terms of confidentiality, integrity, and availability.

    Mandatory Access Control (MAC)

    • A central authority determines what information is to be accessible and by whom in a Mandatory Access Control (MAC) policy.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge of information assurance, operating systems, database security, application software, and steganography with this quiz based on Chapter 8 of CYB 322. Topics covered include IA problems and solutions related to various software components.

    More Like This

    Information Assurance and Security Quiz
    10 questions
    Software Quality and Information Assurance
    5 questions
    Information Assurance Overview and AIAP
    11 questions
    Use Quizgecko on...
    Browser
    Browser