Front | Back |
Which of the following are not valid access control mechanisms?
A. MAC
B. SAC
C. DAC
D. RBAC
|
B. SAC
|
Access control mechanism in which access is granted based on the responsibilities an individual user or process has in an organization?
A. MAC
B. SAC
C. DAC
D. RBAC
|
D. RBAC (Role Based Access Control)
|
Access control mechanism that allows the data owner to create and administer access control?
A. MAC
B. SAC
C. DAC
D. RBAC
|
C. DAC (Discretionary Access Control)
|
What is the primary flaw in the DAC model?
|
DAC (Discretionary Access Control) relies on the ID of the user or process, leaving room for a Trojan Horse.
|
Which Access Control methods provide the most granular access to objects?
A. Capabilities
B. Access Control Lists
C. Permission bits
D. Profiles
|
B. Access Control Lists
|
Owner: Read, Write, Execute,
User A: Read, Write.
User B: none
Sales: Read
Marketing: Read, Write.
User B is in Sales, what effective perms does he have?
|
User B has no permissions on the file. Individual permissions override group permissions.
|
Which are examples of RBAC?
A. File, Printer, mailbox roles
B. Sales, marketing, production
C. User and workstation access roles
|
B. Sales, marketing, and production
|
With DAC access controls each object has an owner, which has full control over the object. (True or False)
|
True
|
Which of the following are used to make access decisions in MAC?
A. Access Control Lists
B. Ownership
C. Group Membership
D. Sensitivity Labels
|
D. Sensitivity Labels
|
Which Access Control methods allow access control based on security labels associated with each data item and each user?
A. MAC
B. RBAC
C. DAC
D. SAC
|
A. MAC (Mandatory Access Control)
|
Which access control method relies on user security clearance and data classification?
A. MAC
B. RBAC
C. DAC
D. SAC
|
A. MAC (Mandatory Access Control)
|
One characteristic of MAC is that it uses levels of security to classify users and data. (True/False)
|
True
|
Which of the following terms best represents MAC?
A. Lattice
B. Bell La-Padula
C. BIBA
D. Clark and Wilson
|
A. Lattice
|
Which of the following passwords generators is based on challenge-response?
A) asymmetric
B) symmetric
C) cryptographic keys
D) smart cards
|
A) asymmetric
|
Which password system provides for large numbers of users?
A) self service password resets
B) locally saved passwords
C) multiple access methods
|
A) self service password resets
|