Search Header Logo

CID - Access COntrol

Authored by magan shiva

Computers

University

Used 9+ times

CID - Access COntrol
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Subjects (Users) and sources of access requests are validated through a proper authentication mechanism.

Reliable input

Least privilege

Open Policies

Closed policies

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Closed policy - only accesses that are explicitly stated should be allowed

True

True

False

False

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Open Policy - Authorizations specify which accesses are not prohibited; all other access are not allowed

True

True

False

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Resource to which access is controlled

Object

Subject

Access right

Owner

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

An entity capable of accessing objects

Access control

Subject

Object

World

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Describe the way in which a subject may access an object

object

access control

subject

object

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What do you understand from figure above

Authorization control list

Access Control List

Capability List

Object list

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers