Search Header Logo

Access Control Models

Authored by Elizabeth Gist

Computers

Used 9+ times

Access Control Models
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access control model relies on assigning labels or classifications to both data and users?

A) Mandatory Access Control (MAC).

B) Discretionary Access Control (DAC).

C) Role-Based Access Control (RBAC).

D) Attribute-Based Access Control (ABAC).

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Role-Based Access Control (RBAC), what is the role of a role?

A) Determines access rights for a specific user.

B) Represents a specific user's identity.

C) Defines a set of permissions.

D) Provides encryption keys for secure access.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access control method allows users to control access to their own resources and decide who can access them?

A) Mandatory Access Control (MAC).

B) Discretionary Access Control (DAC).

C) Role-Based Access Control (RBAC).

D) Rule-Based Access Control (RuBAC).

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a token used for in access control systems?

A) A biometric identifier.

B) An access badge.

C) A physical key.

D) A representation of a user's identity or access rights.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access control mechanism relies on defining rules based on attributes such as user attributes, resource attributes, and environmental conditions?

A) Discretionary Access Control (DAC).

B) Role-Based Access Control (RBAC).

C) Attribute-Based Access Control (ABAC).

D) Mandatory Access Control (MAC).

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of access control?

A) To restrict unauthorized access.

B) To ensure high-speed data transmission.

C) To increase system complexity.

D) To enhance system aesthetics.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access control model uses security labels, such as "confidential" or "top secret," to enforce access rules?

A) Discretionary Access Control (DAC).

B) Mandatory Access Control (MAC).

C) Role-Based Access Control (RBAC).

D) Attribute-Based Access Control (ABAC).

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?