Quiz on Access Control Models

Quiz on Access Control Models

University

20 Qs

quiz-placeholder

Similar activities

เทคโนโลยีสารสนเทศและระบบคอมพิวเตอร์

เทคโนโลยีสารสนเทศและระบบคอมพิวเตอร์

University

15 Qs

Java Quiz 1

Java Quiz 1

University

20 Qs

Mid Test Perancangan&Konstruksi PL

Mid Test Perancangan&Konstruksi PL

University

20 Qs

Excel Quiz

Excel Quiz

KG - University

15 Qs

QUIZ 2

QUIZ 2

University

20 Qs

Review Quiz (Chapter 3&4)

Review Quiz (Chapter 3&4)

University

20 Qs

ĐC CNTT_Chương 1

ĐC CNTT_Chương 1

University

20 Qs

Lecture 5 - Introduction to Computing

Lecture 5 - Introduction to Computing

University

18 Qs

Quiz on Access Control Models

Quiz on Access Control Models

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Binh Nguyen Thanh

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is true about Discretionary Access Control (DAC)?

Access is based on a centralized system administrator's decisions.

Users have full control over the resources they own.

Access rules are determined based on the organization's policies only.

Access control decisions are made dynamically by the system.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In DAC, who determines the access permissions for a resource?

System Administrator

Operating System

Resource Owner

Security Manager

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following mechanisms is commonly used in DAC?

Security Labels

Role-Based Access Control

Access Control List (ACL)

Multi-Level Security (MLS)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In DAC, what happens if a user shares their file with another user?

Ownership of the file is transferred.

Access rights are delegated to the second user.

The system checks for security labels before sharing.

The file is automatically encrypted.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a primary drawback of DAC?

It is too restrictive for users.

It relies on centralized policies.

It allows the propagation of access rights, leading to potential misuse.

It does not allow users to share their resources.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not typically associated with DAC?

File ownership

Group permissions

Access Control Matrix

Security Clearance Levels

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How is DAC commonly implemented in UNIX/Linux systems?

File security labels

User and group permissions (rwx model)

Role-Based Access Control (RBAC)

Mandatory Integrity Control

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?