Exam 4: Access Control

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Basic access control systems typically define three classes of subject: owner,__________ and world.

Free
(Short Answer)
4.8/5
(29)
Correct Answer:
Verified

group

__________ is verification that the credentials of a user or other system entity are valid.

Free
(Multiple Choice)
4.7/5
(28)
Correct Answer:
Verified

B

__________ implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.

Free
(Multiple Choice)
5.0/5
(35)
Correct Answer:
Verified

D

Role hierarchies make use of the concept of __________ to enable one role to implicitly include access rights associated with a subordinate role.

(Short Answer)
4.9/5
(32)

A __________ is a mapping between a user and an activated subset of the set of roles to which the user is assigned.

(Short Answer)
4.7/5
(35)

An approval to perform an operation on one or more RBAC protected objects is _________ .

(Multiple Choice)
4.9/5
(34)

__________ is the traditional method of implementing access control.

(Multiple Choice)
4.9/5
(34)

The principal objectives of computer security are to prevent unauthorized users from gaining access to resources,to prevent legitimate users from accessing resources in an unauthorized manner,and to enable legitimate users to access resources in an authorized manner.

(True/False)
4.7/5
(35)

The default set of rights should always follow the rule of least privilege or read-only access

(True/False)
4.7/5
(43)

__________ access control controls access based on the identity of the requestor and on access rules stating what requestors are or are not allowed to do.

(Short Answer)
4.8/5
(42)

__________ provide a means of adapting RBAC to the specifics of administrative and security policies in an organization.

(Multiple Choice)
4.8/5
(26)

The authentication function determines who is trusted for a given purpose.

(True/False)
4.8/5
(29)

The basic elements of access control are: subject,__________,and access right.

(Short Answer)
4.7/5
(30)

A __________ dictates that a user can only be assigned to a particular role if it is already assigned to some other specified role and can be used to structure the implementation of the least privilege concept.

(Short Answer)
4.8/5
(34)

A __________ is an entity capable of accessing objects.

(Multiple Choice)
4.8/5
(32)

A user may belong to multiple groups.

(True/False)
4.7/5
(34)

__________ is based on the roles the users assume in a system rather than the user's identity.

(Multiple Choice)
4.8/5
(29)

__________ functions provide the capability to create,delete,and maintain RBAC elements and relations.

(Short Answer)
4.8/5
(30)

The main innovation of the NIST standard is the introduction of the RBAC System and Administrative Functional Specification,which defines the features required for an RBAC system.

(True/False)
4.9/5
(20)

_________ specifications limit the availability of the permissions by placing constraints on the roles that can be activated within or across a user's sessions.

(Multiple Choice)
4.9/5
(32)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)