Secure Computer Systems - Quizzes

Secure Computer Systems - Quizzes

University

60 Qs

quiz-placeholder

Similar activities

CHAPTER 1 Miscellaneous Question

CHAPTER 1 Miscellaneous Question

University

61 Qs

2nd MCQ preparation

2nd MCQ preparation

University

60 Qs

拼音:声母韵母

拼音:声母韵母

KG - University

64 Qs

NOMINA

NOMINA

University

62 Qs

BCE AX 26/04/20

BCE AX 26/04/20

University

55 Qs

Medical Terminology Chapter 1: Suffixes and Plurals

Medical Terminology Chapter 1: Suffixes and Plurals

12th Grade - University

61 Qs

ABM 123 - FINAL EXAMINATION

ABM 123 - FINAL EXAMINATION

University

60 Qs

TRY OUT P3K Mapel 17

TRY OUT P3K Mapel 17

University

55 Qs

Secure Computer Systems - Quizzes

Secure Computer Systems - Quizzes

Assessment

Quiz

Other

University

Practice Problem

Medium

Created by

Sarah Reid

Used 9+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

SELinux extends standard Linux access control by offering the following additional mechanisms.

A SELinux user id that is separate from the standard Linux user id.

Mandatory access control.

New access checks that are not performed in Linux.

All of the above.

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Security context in SELinux can be associated with

only subjects/users.

only objects.

either with a user or objects owned by him/her but not both.

both subjects and objects.

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The following is not an example of what is included in an object's security context.

Object's ACL.

Object's type used for type enforcement.

Object's user.

Object's multi-level security range.

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Type enforcement (TE) access rules in SELinux allow policies to be defined that can limit access to objects based on

time of the request made by the requestor.

operation of the object called by the requestor (e.g., read on a file).

previously called operations by the requestor.

all of the above.

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Assume SELinux kernel includes MyLSM Linux security module (LSM). However, no functions implemented by MyLSM are called when a certain file is accessed. This could be due to the following reason(s).

standard discretionary access check on the file request fails.

the access vector check contains no permissions for the file.

the policy database does not specify permissions for the file.

the policy file specifies no access for the file.

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The implementation of the Bell and La Padula model in SELinux allows

only a single sensitivity level to be associated with a user/object.

writes to be done only at the level of the user.

reads to be done only at the level of the user.

none of the above.

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

SELinux policy rules specify

access checks.

inheritance.

overrides.

all of the above.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?