Quiz on Access Control Models

Quiz on Access Control Models

University

20 Qs

quiz-placeholder

Similar activities

Guess The Logo

Guess The Logo

5th Grade - Professional Development

15 Qs

Komponen Jaringan & Pengkabelan

Komponen Jaringan & Pengkabelan

University

15 Qs

Python Quiz For Starters

Python Quiz For Starters

3rd Grade - Professional Development

17 Qs

Django-quiz

Django-quiz

5th Grade - University

20 Qs

Uji Pengetahuan Jaringan Komputer

Uji Pengetahuan Jaringan Komputer

9th Grade - University

20 Qs

MIDTERM EXAM - IT APP

MIDTERM EXAM - IT APP

University

17 Qs

C - Structures

C - Structures

University

20 Qs

Kuis Dadakan ;)

Kuis Dadakan ;)

10th Grade - University

15 Qs

Quiz on Access Control Models

Quiz on Access Control Models

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Binh Nguyen Thanh

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is true about Discretionary Access Control (DAC)?

Access is based on a centralized system administrator's decisions.

Users have full control over the resources they own.

Access rules are determined based on the organization's policies only.

Access control decisions are made dynamically by the system.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In DAC, who determines the access permissions for a resource?

System Administrator

Operating System

Resource Owner

Security Manager

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following mechanisms is commonly used in DAC?

Security Labels

Role-Based Access Control

Access Control List (ACL)

Multi-Level Security (MLS)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In DAC, what happens if a user shares their file with another user?

Ownership of the file is transferred.

Access rights are delegated to the second user.

The system checks for security labels before sharing.

The file is automatically encrypted.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a primary drawback of DAC?

It is too restrictive for users.

It relies on centralized policies.

It allows the propagation of access rights, leading to potential misuse.

It does not allow users to share their resources.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not typically associated with DAC?

File ownership

Group permissions

Access Control Matrix

Security Clearance Levels

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How is DAC commonly implemented in UNIX/Linux systems?

File security labels

User and group permissions (rwx model)

Role-Based Access Control (RBAC)

Mandatory Integrity Control

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?