Access Control Models

Access Control Models

10 Qs

quiz-placeholder

Similar activities

Information Security Quiz

Information Security Quiz

8th Grade

15 Qs

Security+

Security+

University

15 Qs

Access Control

Access Control

University

10 Qs

Chapter 5(3of3)

Chapter 5(3of3)

University

10 Qs

Authentication,Authorisation,Access Control

Authentication,Authorisation,Access Control

University

12 Qs

10.3 Authentication

10.3 Authentication

9th - 12th Grade

11 Qs

CID - Access COntrol

CID - Access COntrol

University

10 Qs

Module 13 (Fundamentals of Cybersecurity)

Module 13 (Fundamentals of Cybersecurity)

University

12 Qs

Access Control Models

Access Control Models

Assessment

Quiz

Computers

Hard

Created by

Elizabeth Gist

Used 9+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access control model relies on assigning labels or classifications to both data and users?

A) Mandatory Access Control (MAC).

B) Discretionary Access Control (DAC).

C) Role-Based Access Control (RBAC).

D) Attribute-Based Access Control (ABAC).

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Role-Based Access Control (RBAC), what is the role of a role?

A) Determines access rights for a specific user.

B) Represents a specific user's identity.

C) Defines a set of permissions.

D) Provides encryption keys for secure access.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access control method allows users to control access to their own resources and decide who can access them?

A) Mandatory Access Control (MAC).

B) Discretionary Access Control (DAC).

C) Role-Based Access Control (RBAC).

D) Rule-Based Access Control (RuBAC).

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a token used for in access control systems?

A) A biometric identifier.

B) An access badge.

C) A physical key.

D) A representation of a user's identity or access rights.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access control mechanism relies on defining rules based on attributes such as user attributes, resource attributes, and environmental conditions?

A) Discretionary Access Control (DAC).

B) Role-Based Access Control (RBAC).

C) Attribute-Based Access Control (ABAC).

D) Mandatory Access Control (MAC).

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of access control?

A) To restrict unauthorized access.

B) To ensure high-speed data transmission.

C) To increase system complexity.

D) To enhance system aesthetics.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access control model uses security labels, such as "confidential" or "top secret," to enforce access rules?

A) Discretionary Access Control (DAC).

B) Mandatory Access Control (MAC).

C) Role-Based Access Control (RBAC).

D) Attribute-Based Access Control (ABAC).

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?