Search Header Logo

grade 12 Access Control & Transaction Properties

Authored by muzaffar mazaheem

Computers

11th Grade

Used 1+ times

grade 12 Access Control & Transaction Properties
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does MAC stand for in access control?

Mobile Application Center

Media Access Control

Memory Access Code

Mainframe Access Control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Define Discretionary Access Control (DAC).

A security model where access is controlled by a central authority

A security model where access is controlled by the system administrator

A security model where access is controlled by the user's role

A security model where the owner of an object controls access and permissions.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Explain the concept of Role-based Access Control (RBAC).

RBAC is a method of granting access based on the user's IP address

RBAC is a method of restricting access based on the user's age

RBAC is a method of controlling access based on the user's favorite color

RBAC is a method of restricting network access based on the roles of individual users within an enterprise.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Rule-based Access Control in terms of access control?

Rule-based Access Control is a method of granting access to all users without any restrictions.

Rule-based Access Control is a method of restricting access based on biometric authentication.

Rule-based Access Control is a method of restricting access to resources based on a set of rules defined by a system administrator or security policy.

Rule-based Access Control is a method of restricting access based on user popularity.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Describe Attribute-based Access Control (ABAC).

Attribute-based Access Control (ABAC) is a security model that defines access control based on attributes associated with users, resources, and the environment. It evaluates rules and policies to determine access rights.

Attribute-based Access Control (ABAC) is a security model that evaluates access based on historical data.

Attribute-based Access Control (ABAC) is a security model that relies on biometric authentication.

Attribute-based Access Control (ABAC) only considers user roles for access control.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the properties of a transaction in ACID?

Atomicity

Consistency

Isolation

Volatility

Atomicity, Consistency, Isolation, Durability

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Mandatory Access Control (MAC), who determines access permissions?

System administrator or security policy administrator

Application developers

End-users

Network devices

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?