
Database Security - Quiz 6
Authored by Hamidah Ibrahim
Computers
1st - 5th Grade
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
If an individual user can set an access control mechanism to allow or deny access to an object, that mechanism is a ________________.
Content-based Access Control
Mandatory Access Control Models (MAC)
Discretionary Access Control Models (DAC)
Role-Based Access Control (RBAC)
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
When a system mechanism controls access to an object and an individual user cannot alter that access, the control is a ________________.
Content-based Access Control
Mandatory Access Control Models (MAC)
Discretionary Access Control Models (DAC)
Role-Based Access Control (RBAC)
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A security paradigm where users are granted access depending on their role in the organisation is called ________________.
Content-based Access Control
Mandatory Access Control Models (MAC)
Discretionary Access Control Models (DAC)
Role-Based Access Control (RBAC)
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The main drawback of DAC is ________________.
Trojan Horse
Trapdoor
Logic bomb
Spyware
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A state, i.e. an access matrix M, is said to ________________ the right r if there exists a command c that adds the right r into an entry in the access matrix that previously did not contain r.
safe
grant
revoke
leak
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A state of a protection system, that is, its matrix M, is said to be ________________ with respect to the right r if no sequence of commands can transform M into a state that leaks r.
leak
safe
unsafe
exposed
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
In ________________, the subject is authorised to use a requested system resource indirectly because the objects in the system are referenced in terms of other objects.
Negative authorisation
Positive authorisation
Implicit authorisation
Explicit authorisation
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?