Quiz on Access Control Models

Quiz on Access Control Models

University

20 Qs

quiz-placeholder

Similar activities

Module 4B. Post-Exploitation - Linux Privilege Escalation

Module 4B. Post-Exploitation - Linux Privilege Escalation

University

22 Qs

IT Essential Chapter 5 Windows Installations

IT Essential Chapter 5 Windows Installations

University

20 Qs

ASI 4

ASI 4

University

15 Qs

DKB4213 K4 English

DKB4213 K4 English

University

15 Qs

F2 User Access and Permissions Quiz

F2 User Access and Permissions Quiz

12th Grade - University

15 Qs

Security+

Security+

University

15 Qs

CHAPTER 4 HARDENING OPERATING SYSTEM

CHAPTER 4 HARDENING OPERATING SYSTEM

University

18 Qs

AOS Quiz

AOS Quiz

University

20 Qs

Quiz on Access Control Models

Quiz on Access Control Models

Assessment

Quiz

Computers

University

Hard

Created by

Binh Nguyen Thanh

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is true about Discretionary Access Control (DAC)?

Access is based on a centralized system administrator's decisions.

Users have full control over the resources they own.

Access rules are determined based on the organization's policies only.

Access control decisions are made dynamically by the system.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In DAC, who determines the access permissions for a resource?

System Administrator

Operating System

Resource Owner

Security Manager

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following mechanisms is commonly used in DAC?

Security Labels

Role-Based Access Control

Access Control List (ACL)

Multi-Level Security (MLS)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In DAC, what happens if a user shares their file with another user?

Ownership of the file is transferred.

Access rights are delegated to the second user.

The system checks for security labels before sharing.

The file is automatically encrypted.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a primary drawback of DAC?

It is too restrictive for users.

It relies on centralized policies.

It allows the propagation of access rights, leading to potential misuse.

It does not allow users to share their resources.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not typically associated with DAC?

File ownership

Group permissions

Access Control Matrix

Security Clearance Levels

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How is DAC commonly implemented in UNIX/Linux systems?

File security labels

User and group permissions (rwx model)

Role-Based Access Control (RBAC)

Mandatory Integrity Control

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?