Operating System Access Control Mechanisms
16 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the access enforcement mechanism in an operating system?

  • Access matrix
  • Access control lists (ACLs)
  • Reference monitor (correct)
  • Security labels

Which access control system decentralizes security decisions to resource owners?

  • Role-Based Access Control (RBAC)
  • Access matrix
  • Discretionary Access Control (DAC) (correct)
  • Mandatory Access Control (MAC)

What type of access control uses a classifica)on system to describe a resource’s sensi)vity?

  • Discretionary Access Control (DAC)
  • Mandatory Access Control (MAC) (correct)
  • Role-Based Access Control (RBAC)
  • Access matrix

What element does the security label in mandatory access control consist of?

<p>Classifica)on and clearance (D)</p> Signup and view all the answers

Which type of access control uses a centrally managed model to provide the highest level of security?

<p>Mandatory Access Control (MAC) (C)</p> Signup and view all the answers

What does the access matrix define in an operating system's access control?

<p>The protec)on domain of a process (A)</p> Signup and view all the answers

What is the main purpose of a user’s compartment in access control?

<p>To define the group of people allowed access (C)</p> Signup and view all the answers

In access control, what does Role-based Access Control (RBAC) primarily focus on?

<p>Restricting access to privileged operations (D)</p> Signup and view all the answers

What is the classical access enforcement mechanism in access control systems called?

<p>Reference monitor (C)</p> Signup and view all the answers

How does authorization differ from authentication in an operating system's access control?

<p>Authorization determines the user's identity before revealing sensitive information (C)</p> Signup and view all the answers

What is the responsibility of the operating system in authentication mechanism?

<p>To create a protection system that authenticates users (D)</p> Signup and view all the answers

Which method of user identification/authentication involves using a registered username and password?

<p>Username / Password (A)</p> Signup and view all the answers

What type of access control allows an administrator to assign privileged functions to specific user accounts or roles?

<p>Mandatory Access Control (MAC) (C)</p> Signup and view all the answers

What is the main emphasis of Role-based Access Control (RBAC)?

<p>&quot;Least privilege&quot; policies implementation (C)</p> Signup and view all the answers

Which method of user identification/authentication involves passing a user's attribute via a designated input device used by the operating system?

<p>Fingerprint/eye retina pattern/signature (D)</p> Signup and view all the answers

What does a reference monitor in access control do?

<p>Takes a request as input and returns a binary response indicating authorization (B)</p> Signup and view all the answers

More Like This

Operating System Security Chapter
6 questions

Operating System Security Chapter

PrestigiousRutherfordium avatar
PrestigiousRutherfordium
Operating System Security Levels
29 questions
Operating System Security
24 questions
Use Quizgecko on...
Browser
Browser