Operating System Access Control Concepts
16 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the system’s access enforcement mechanism that enforces the access control specification?

  • Mandatory Access Control (MAC)
  • Discretionary Access Control (DAC)
  • Reference monitor (correct)
  • Access matrix

Which type of access control decentralizes security decisions to resource owners?

  • Mandatory Access Control (MAC)
  • Discretionary Access Control (DAC) (correct)
  • Role-Based Access Control (RBAC)
  • Access matrix

What type of access control uses a centrally managed model to provide the highest level of security?

  • Reference monitor
  • Mandatory Access Control (MAC) (correct)
  • Role-Based Access Control (RBAC)
  • Access matrix

What type of access control applies security labels to resources and individuals?

<p>Mandatory Access Control (MAC) (D)</p> Signup and view all the answers

What does MAC rely on to describe a resource’s sensitivity?

<p>Classification system (A)</p> Signup and view all the answers

What is used to define the protection domain of a process?

<p>Access matrix (D)</p> Signup and view all the answers

What is the primary purpose of Role-based Access Control (RBAC)?

<p>To assign privileged functions to specific user accounts (A)</p> Signup and view all the answers

What is the responsibility of the reference monitor in access control?

<p>To enforce the access control policy (C)</p> Signup and view all the answers

How does Role-based Access Control (RBAC) relate to the principle of least privilege?

<p>By selectively granting privileges based on unique needs (D)</p> Signup and view all the answers

What role does authorization play in access control?

<p>Determining if a client has permission to use a resource (A)</p> Signup and view all the answers

How does an operating system typically authenticate users?

<p>By using username/password, user card/key, or user attributes (C)</p> Signup and view all the answers

What is the purpose of a user's compartment in access control?

<p>To define the group or groups a user participates in (D)</p> Signup and view all the answers

What is the primary function of a reference monitor in access control?

<p>Enforcing the access control policy (D)</p> Signup and view all the answers

What is the main goal of using RBAC in organizations?

<p>To selectively grant privileges based on unique needs and requirements (A)</p> Signup and view all the answers

How does RBAC align with the security principle of least privilege?

<p>By selectively granting privileges based on unique needs and requirements (B)</p> Signup and view all the answers

What distinguishes authorization from authentication in the context of access control?

<p>The process by which a server determines if a client has permission to use a resource or access a file. (D)</p> Signup and view all the answers

More Like This

Operating System Security Chapter
6 questions

Operating System Security Chapter

PrestigiousRutherfordium avatar
PrestigiousRutherfordium
Operating System Security Levels
29 questions
Operating System Security
24 questions
Use Quizgecko on...
Browser
Browser