
Access Control
Authored by Blake Samuels
Computers
KG
Used 61+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Method of Access Control where objects have labels. Access is set by the system AND data owner
MAC
DAC
Rule-BAC
Roll-BAC
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An administer needs to grant users access to different servers based on their job functions. Which Access Control model is the BEST choice to use?
Role-Based Access Control
Discretionary Access Control
Non-Discretionary Access Control
Mandatory Access Control
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Access control is defined by the owner/creator of the information. User can share with few restrictions
DAC
MAC
Rule-BAC
Role-BAC
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The process of restricting access to a resource to only permitted users
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
defines an access control paradigm whereby access rights are granted to users through the use of policies which combine attributes together
MAC
RBAC
ABAC
DAC
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
access is assigned by the system administrator and is stringently based on the subject’s role within the company
RBAC
MAC
DAC
ABAC
7.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
refers to a type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target
Mandatory Access Central
Mamdatory Access Control
Mandatory Access Controller
Mandatory Access Control
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?