Podcast
Questions and Answers
Which type of access control policy is enforced uniformly across all subjects and objects within the boundary of an information system?
Which type of access control policy is enforced uniformly across all subjects and objects within the boundary of an information system?
- Mandatory access control (MAC) (correct)
- Role-based access control (RBAC)
- Discretionary access control (DAC)
- Attribute-based access control (ABAC)
Which access control policy allows the owner of a resource to control access to that resource?
Which access control policy allows the owner of a resource to control access to that resource?
- Role-based access control (RBAC)
- Mandatory access control (MAC)
- Discretionary access control (DAC) (correct)
- Attribute-based access control (ABAC)
Which of the following is NOT a type of logical access control?
Which of the following is NOT a type of logical access control?
- Hardware settings done with switches, jumper plugs or other means
- Configuration settings or parameters stored as data
- Security guards (correct)
- Graphical user interface (GUI) managed through software
Which of the following is an example of a physical access control?
Which of the following is an example of a physical access control?
Which access control policy sets up user permissions based on roles?
Which access control policy sets up user permissions based on roles?
What is the purpose of two-person integrity?
What is the purpose of two-person integrity?
Which type of access control model is considered the most restrictive, where the system owner defines and enforces the access control policy?
Which type of access control model is considered the most restrictive, where the system owner defines and enforces the access control policy?
Which access control mechanism allows users to create, modify, and delete access control rules for the resources they own?
Which access control mechanism allows users to create, modify, and delete access control rules for the resources they own?
Which of the following is NOT an example of a physical access control?
Which of the following is NOT an example of a physical access control?
Which access control model uses roles to manage permissions and access privileges?
Which access control model uses roles to manage permissions and access privileges?
Which of the following is NOT a common activity performed during the 'offboarding' process for a terminated employee?
Which of the following is NOT a common activity performed during the 'offboarding' process for a terminated employee?
Which of the following is NOT a benefit of Privileged Access Management (PAM)?
Which of the following is NOT a benefit of Privileged Access Management (PAM)?
Which of the following is an example of a physical access control?
Which of the following is an example of a physical access control?
What is the principle of least privilege?
What is the principle of least privilege?
Which of the following is a form of mandatory access control (MAC)?
Which of the following is a form of mandatory access control (MAC)?
What is the purpose of segregation of duties (or separation of duties)?
What is the purpose of segregation of duties (or separation of duties)?
What is a privileged account in the context of information security?
What is a privileged account in the context of information security?
What is the fundamental concept behind role-based access control (RBAC)?
What is the fundamental concept behind role-based access control (RBAC)?