Which access control model allows the owner of an object to decide who can access it?
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Security models and conc

Interactive Video
•
Information Technology (IT), Architecture
•
University
•
Hard
Quizizz Content
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Mandatory Access Control (MAC)
Discretionary Access Control (DAC)
Role-Based Access Control (RBAC)
Attribute-Based Access Control (ABAC)
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary focus of the Bell-LaPadula model?
Integrity
Availability
Usability
Confidentiality
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the Biba model, what does the 'no write up' rule ensure?
Subjects cannot read from higher integrity levels
Subjects cannot write to higher integrity levels
Subjects cannot read from lower integrity levels
Subjects cannot write to lower integrity levels
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which model uses well-formed transactions to maintain data integrity?
Clark-Wilson Model
Harrison-Ruzzo-Ullman Model
Brewer-Nash Model
Graham-Denning Model
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main purpose of the Brewer-Nash model?
To manage user roles
To prevent conflicts of interest
To ensure confidentiality
To enforce data integrity
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the take-grant protection model, what does the 'grant' rule allow?
A subject to take rights from another subject
A subject to grant its rights to another subject
A subject to create new objects
A subject to remove rights from an object
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a key feature of the noninterference model?
It focuses on data availability
It manages conflicts of interest
It ensures actions at higher levels do not affect lower levels
It allows subjects to grant permissions
Create a free account and access millions of resources
Similar Resources on Quizizz
6 questions
A Detailed Guide to the OWASP Top 10 - #9 Security Logging and Monitoring Failures Prevention

Interactive video
•
University
8 questions
Akamai CEO on Pivot From Web to Cloud Security

Interactive video
•
University
8 questions
Election security concerns: Voting machines, malware and misinformation

Interactive video
•
University
8 questions
Web Security: Common Vulnerabilities And Their Mitigation - Wrapping up the OWASP top 10 list

Interactive video
•
University
6 questions
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - What have We Covered in Domain 1?

Interactive video
•
University
8 questions
Fundamentals of Secure Software - Application Security Goals

Interactive video
•
University
8 questions
CISSP Crash Course - Security Concepts

Interactive video
•
University
6 questions
Information security for use of cloud services control

Interactive video
•
University
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade