Search Header Logo

Database Security - Quiz 6

Authored by Hamidah Ibrahim

Computers

1st - 5th Grade

Used 6+ times

Database Security - Quiz 6
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

If an individual user can set an access control mechanism to allow or deny access to an object, that mechanism is a ________________.

Content-based Access Control

Mandatory Access Control Models (MAC)

Discretionary Access Control Models (DAC)

Role-Based Access Control (RBAC)

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

When a system mechanism controls access to an object and an individual user cannot alter that access, the control is a ________________.

Content-based Access Control

Mandatory Access Control Models (MAC)

Discretionary Access Control Models (DAC)

Role-Based Access Control (RBAC)

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security paradigm where users are granted access depending on their role in the organisation is called ________________.

Content-based Access Control

Mandatory Access Control Models (MAC)

Discretionary Access Control Models (DAC)

Role-Based Access Control (RBAC)

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The main drawback of DAC is ________________.

Trojan Horse

Trapdoor

Logic bomb

Spyware

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A state, i.e. an access matrix M, is said to ________________ the right r if there exists a command c that adds the right r into an entry in the access matrix that previously did not contain r.

safe

grant

revoke

leak

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A state of a protection system, that is, its matrix M, is said to be ________________ with respect to the right r if no sequence of commands can transform M into a state that leaks r.

leak

safe

unsafe

exposed

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In ________________, the subject is authorised to use a requested system resource indirectly because the objects in the system are referenced in terms of other objects.

Negative authorisation

Positive authorisation

Implicit authorisation

Explicit authorisation

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?