Access Controls Quiz Flashcards
Which of the following answers refer(s) to the Mandatory Access Control (MAC) model? (Select all that apply)
A) Users are not allowed to change access policies at their own discretion
B) Labels and clearance levels can only be applied and changed by an administrator
C) Every object has an owner who at his/her own discretion determines what kind of permissions other users can have to that object
D) Access to resources based on user identity
E) Every resource has a sensitivity label matching a clearance level assigned to a user
A) Users are not allowed to change access policies at their own discretion
B) Labels and clearance levels can only be applied and changed by an administrator
E) Every resource has a sensitivity label matching a clearance level assigned to a user
Discretionary Access Control (DAC) is an access control model based on user identity. In DAC, every object has an owner who at his/her own discretion determines what kind of permissions other users can have for that object.
A) True
B) False
A) True
Which type of control access model connects user permissions to their specific responsibilities?
A) DAC
B) RBAC
C) MAC
D) ABAC
B) RBAC
Which access control model allows for defining granular rules that consider user roles, time constraints, and network access restrictions?
A) ABAC
B) MAC
C) RuBAC
D) DAC
E) RBAC
C) RuBAC
Examples of properties used for defining access policies in Attribute-Based Access Control (ABAC) model include:
A) Subject (i.e., user or process requesting access)
B) Type of action (for example “read”, “write”, “execute”)
C) Resource type (medical record, bank account etc.)
D) Environment (contextual data, such as time of day or geolocation)
E) All of the above
E) All of the above
Which access control model defines access control rules with the use of statements that closely resemble natural language?
A) DAC
B) ABAC
C) MAC
D) RBAC
B) ABAC
Which of the access control models listed below enforces the strictest set of access rules?
A) MAC
B) RBAC
C) DAC
D) ABAC
A) MAC
Which of the following access control methods would be the most suitable for scheduling system maintenance tasks during periods of low user activity?
A) Resource provisioning
B) Time-of-day restrictions
C) Principle of least privilege
D) Just-in-time permissions
B) Time-of-day restrictions
The principle of least privilege is a security rule that prevents users from accessing information and resources that lie beyond the scope of their responsibilities.
A) True
B) False
A) True