
Access Control Models
Authored by Elizabeth Gist
Computers
Used 10+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which access control model relies on assigning labels or classifications to both data and users?
A) Mandatory Access Control (MAC).
B) Discretionary Access Control (DAC).
C) Role-Based Access Control (RBAC).
D) Attribute-Based Access Control (ABAC).
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In Role-Based Access Control (RBAC), what is the role of a role?
A) Determines access rights for a specific user.
B) Represents a specific user's identity.
C) Defines a set of permissions.
D) Provides encryption keys for secure access.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which access control method allows users to control access to their own resources and decide who can access them?
A) Mandatory Access Control (MAC).
B) Discretionary Access Control (DAC).
C) Role-Based Access Control (RBAC).
D) Rule-Based Access Control (RuBAC).
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a token used for in access control systems?
A) A biometric identifier.
B) An access badge.
C) A physical key.
D) A representation of a user's identity or access rights.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which access control mechanism relies on defining rules based on attributes such as user attributes, resource attributes, and environmental conditions?
A) Discretionary Access Control (DAC).
B) Role-Based Access Control (RBAC).
C) Attribute-Based Access Control (ABAC).
D) Mandatory Access Control (MAC).
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary goal of access control?
A) To restrict unauthorized access.
B) To ensure high-speed data transmission.
C) To increase system complexity.
D) To enhance system aesthetics.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which access control model uses security labels, such as "confidential" or "top secret," to enforce access rules?
A) Discretionary Access Control (DAC).
B) Mandatory Access Control (MAC).
C) Role-Based Access Control (RBAC).
D) Attribute-Based Access Control (ABAC).
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?