
CID - Access COntrol
Authored by magan shiva
Computers
University
Used 10+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Subjects (Users) and sources of access requests are validated through a proper authentication mechanism.
Reliable input
Least privilege
Open Policies
Closed policies
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Closed policy - only accesses that are explicitly stated should be allowed
True
True
False
False
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Open Policy - Authorizations specify which accesses are not prohibited; all other access are not allowed
True
True
False
False
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Resource to which access is controlled
Object
Subject
Access right
Owner
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
An entity capable of accessing objects
Access control
Subject
Object
World
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Describe the way in which a subject may access an object
object
access control
subject
object
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do you understand from figure above
Authorization control list
Access Control List
Capability List
Object list
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?