Podcast
Questions and Answers
Which type of access control policy is enforced uniformly across all subjects and objects within the boundary of an information system?
Which type of access control policy is enforced uniformly across all subjects and objects within the boundary of an information system?
Which access control policy allows the owner of a resource to control access to that resource?
Which access control policy allows the owner of a resource to control access to that resource?
Which of the following is NOT a type of logical access control?
Which of the following is NOT a type of logical access control?
Which of the following is an example of a physical access control?
Which of the following is an example of a physical access control?
Signup and view all the answers
Which access control policy sets up user permissions based on roles?
Which access control policy sets up user permissions based on roles?
Signup and view all the answers
What is the purpose of two-person integrity?
What is the purpose of two-person integrity?
Signup and view all the answers
Which type of access control model is considered the most restrictive, where the system owner defines and enforces the access control policy?
Which type of access control model is considered the most restrictive, where the system owner defines and enforces the access control policy?
Signup and view all the answers
Which access control mechanism allows users to create, modify, and delete access control rules for the resources they own?
Which access control mechanism allows users to create, modify, and delete access control rules for the resources they own?
Signup and view all the answers
Which of the following is NOT an example of a physical access control?
Which of the following is NOT an example of a physical access control?
Signup and view all the answers
Which access control model uses roles to manage permissions and access privileges?
Which access control model uses roles to manage permissions and access privileges?
Signup and view all the answers
Which of the following is NOT a common activity performed during the 'offboarding' process for a terminated employee?
Which of the following is NOT a common activity performed during the 'offboarding' process for a terminated employee?
Signup and view all the answers
Which of the following is NOT a benefit of Privileged Access Management (PAM)?
Which of the following is NOT a benefit of Privileged Access Management (PAM)?
Signup and view all the answers
Which of the following is an example of a physical access control?
Which of the following is an example of a physical access control?
Signup and view all the answers
What is the principle of least privilege?
What is the principle of least privilege?
Signup and view all the answers
Which of the following is a form of mandatory access control (MAC)?
Which of the following is a form of mandatory access control (MAC)?
Signup and view all the answers
What is the purpose of segregation of duties (or separation of duties)?
What is the purpose of segregation of duties (or separation of duties)?
Signup and view all the answers
What is a privileged account in the context of information security?
What is a privileged account in the context of information security?
Signup and view all the answers
What is the fundamental concept behind role-based access control (RBAC)?
What is the fundamental concept behind role-based access control (RBAC)?
Signup and view all the answers