Podcast
Questions and Answers
What is the access enforcement mechanism in an operating system?
What is the access enforcement mechanism in an operating system?
- Access matrix
- Access control lists (ACLs)
- Reference monitor (correct)
- Security labels
Which access control system decentralizes security decisions to resource owners?
Which access control system decentralizes security decisions to resource owners?
- Role-Based Access Control (RBAC)
- Access matrix
- Discretionary Access Control (DAC) (correct)
- Mandatory Access Control (MAC)
What type of access control uses a classifica)on system to describe a resource’s sensi)vity?
What type of access control uses a classifica)on system to describe a resource’s sensi)vity?
- Discretionary Access Control (DAC)
- Mandatory Access Control (MAC) (correct)
- Role-Based Access Control (RBAC)
- Access matrix
What element does the security label in mandatory access control consist of?
What element does the security label in mandatory access control consist of?
Which type of access control uses a centrally managed model to provide the highest level of security?
Which type of access control uses a centrally managed model to provide the highest level of security?
What does the access matrix define in an operating system's access control?
What does the access matrix define in an operating system's access control?
What is the main purpose of a user’s compartment in access control?
What is the main purpose of a user’s compartment in access control?
In access control, what does Role-based Access Control (RBAC) primarily focus on?
In access control, what does Role-based Access Control (RBAC) primarily focus on?
What is the classical access enforcement mechanism in access control systems called?
What is the classical access enforcement mechanism in access control systems called?
How does authorization differ from authentication in an operating system's access control?
How does authorization differ from authentication in an operating system's access control?
What is the responsibility of the operating system in authentication mechanism?
What is the responsibility of the operating system in authentication mechanism?
Which method of user identification/authentication involves using a registered username and password?
Which method of user identification/authentication involves using a registered username and password?
What type of access control allows an administrator to assign privileged functions to specific user accounts or roles?
What type of access control allows an administrator to assign privileged functions to specific user accounts or roles?
What is the main emphasis of Role-based Access Control (RBAC)?
What is the main emphasis of Role-based Access Control (RBAC)?
Which method of user identification/authentication involves passing a user's attribute via a designated input device used by the operating system?
Which method of user identification/authentication involves passing a user's attribute via a designated input device used by the operating system?
What does a reference monitor in access control do?
What does a reference monitor in access control do?