
Secure Computer Systems - Quizzes
Quiz
•
Other
•
University
•
Practice Problem
•
Medium
Sarah Reid
Used 9+ times
FREE Resource
Enhance your content in a minute
60 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
SELinux extends standard Linux access control by offering the following additional mechanisms.
A SELinux user id that is separate from the standard Linux user id.
Mandatory access control.
New access checks that are not performed in Linux.
All of the above.
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Security context in SELinux can be associated with
only subjects/users.
only objects.
either with a user or objects owned by him/her but not both.
both subjects and objects.
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
The following is not an example of what is included in an object's security context.
Object's ACL.
Object's type used for type enforcement.
Object's user.
Object's multi-level security range.
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Type enforcement (TE) access rules in SELinux allow policies to be defined that can limit access to objects based on
time of the request made by the requestor.
operation of the object called by the requestor (e.g., read on a file).
previously called operations by the requestor.
all of the above.
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Assume SELinux kernel includes MyLSM Linux security module (LSM). However, no functions implemented by MyLSM are called when a certain file is accessed. This could be due to the following reason(s).
standard discretionary access check on the file request fails.
the access vector check contains no permissions for the file.
the policy database does not specify permissions for the file.
the policy file specifies no access for the file.
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
The implementation of the Bell and La Padula model in SELinux allows
only a single sensitivity level to be associated with a user/object.
writes to be done only at the level of the user.
reads to be done only at the level of the user.
none of the above.
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
SELinux policy rules specify
access checks.
inheritance.
overrides.
all of the above.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
62 questions
VT7_Telemarketing
Quiz
•
University - Professi...
60 questions
ADMINISTRANDO ANDO...
Quiz
•
University
60 questions
Teste de código 005
Quiz
•
University
60 questions
Spanish 1st 9-Weeks Exam 1
Quiz
•
KG - University
60 questions
Soal latihan UP PPG
Quiz
•
University
60 questions
Post Test in TLE 7
Quiz
•
7th Grade - University
55 questions
Examen Global
Quiz
•
University
58 questions
Introducción Test 1
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for Other
7 questions
How James Brown Invented Funk
Interactive video
•
10th Grade - University
5 questions
Helping Build the Internet: Valerie Thomas | Great Minds
Interactive video
•
11th Grade - University
12 questions
IREAD Week 4 - Review
Quiz
•
3rd Grade - University
23 questions
Subject Verb Agreement
Quiz
•
9th Grade - University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
19 questions
Review2-TEACHER
Quiz
•
University
15 questions
Pre2_STUDENT
Quiz
•
University
20 questions
Ch. 7 Quadrilateral Quiz Review
Quiz
•
KG - University
