Podcast
Questions and Answers
What is the system’s access enforcement mechanism that enforces the access control specification?
What is the system’s access enforcement mechanism that enforces the access control specification?
- Mandatory Access Control (MAC)
- Discretionary Access Control (DAC)
- Reference monitor (correct)
- Access matrix
Which type of access control decentralizes security decisions to resource owners?
Which type of access control decentralizes security decisions to resource owners?
- Mandatory Access Control (MAC)
- Discretionary Access Control (DAC) (correct)
- Role-Based Access Control (RBAC)
- Access matrix
What type of access control uses a centrally managed model to provide the highest level of security?
What type of access control uses a centrally managed model to provide the highest level of security?
- Reference monitor
- Mandatory Access Control (MAC) (correct)
- Role-Based Access Control (RBAC)
- Access matrix
What type of access control applies security labels to resources and individuals?
What type of access control applies security labels to resources and individuals?
What does MAC rely on to describe a resource’s sensitivity?
What does MAC rely on to describe a resource’s sensitivity?
What is used to define the protection domain of a process?
What is used to define the protection domain of a process?
What is the primary purpose of Role-based Access Control (RBAC)?
What is the primary purpose of Role-based Access Control (RBAC)?
What is the responsibility of the reference monitor in access control?
What is the responsibility of the reference monitor in access control?
How does Role-based Access Control (RBAC) relate to the principle of least privilege?
How does Role-based Access Control (RBAC) relate to the principle of least privilege?
What role does authorization play in access control?
What role does authorization play in access control?
How does an operating system typically authenticate users?
How does an operating system typically authenticate users?
What is the purpose of a user's compartment in access control?
What is the purpose of a user's compartment in access control?
What is the primary function of a reference monitor in access control?
What is the primary function of a reference monitor in access control?
What is the main goal of using RBAC in organizations?
What is the main goal of using RBAC in organizations?
How does RBAC align with the security principle of least privilege?
How does RBAC align with the security principle of least privilege?
What distinguishes authorization from authentication in the context of access control?
What distinguishes authorization from authentication in the context of access control?