Exam 4: Access Control

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An access right describes the way in which a subject may access an object.

(True/False)
4.7/5
(30)

A user program executes in a kernel mode in which certain areas of memory are protected from the user's use and certain instructions may not be executed.

(True/False)
4.7/5
(31)

The NIST model defines two types of role hierarchies: general role hierarchies and ___________ hierarchies.

(Short Answer)
4.8/5
(34)

X.800 defines __________ as the prevention of unauthorized use of a resource, including the prevention of use of a resource in an unauthorized manner.

(Short Answer)
4.8/5
(40)

Access control is the central element of computer security.

(True/False)
4.9/5
(33)

A(n)__________ is a resource to which access is controlled.

(Multiple Choice)
4.7/5
(24)

Any program that is owned by,and SetUID to,the "superuser" potentially grants unrestricted access to the system to any user executing that program.

(True/False)
4.8/5
(33)

The __________ user ID is exempt from the usual file access control constraints and has system wide access.

(Short Answer)
4.9/5
(34)

The final permission bit is the _________ bit.

(Multiple Choice)
4.8/5
(30)

_________ is the granting of a right or permission to a system entity to access a system resource.

(Multiple Choice)
4.8/5
(34)

__________ controls access based on comparing security labels with security clearances.

(Multiple Choice)
4.8/5
(31)

An independent review and examination of system records and activities in order to test for adequacy of system controls,to ensure compliance with established policy and operational procedures,to detect breaches in security,and to recommend any indicated changes in control,policy and procedures is a(n)__________ .

(Short Answer)
4.9/5
(36)

The __________ functions include the following: create a user session with a default set of active roles; add an active role to a session; delete a role from a session; and check if the session subject has permission to perform a request operation on an object.

(Short Answer)
4.8/5
(32)

A constraint is a defined relationship among roles or a condition related to roles.

(True/False)
4.8/5
(31)

__________ Separation of Duty enables the definition of a set of mutually exclusive roles,such that if a user is assigned to one role in the set,the user may not be assigned to any other role in the set.

(Short Answer)
4.9/5
(32)

A __________ access control scheme is one in which an entity may be granted access rights that permit the entity,by its own volition,to enable another entity to access some resource.

(Short Answer)
4.8/5
(41)

__________ refers to setting a maximum number with respect to roles.

(Multiple Choice)
4.7/5
(35)

Reliable input is an access control requirement.

(True/False)
4.9/5
(26)

T F 4.External devices such as firewalls cannot provide access control services.

(True/False)
4.8/5
(41)

Traditional RBAC systems define the access rights of individual users and groups of users.

(True/False)
4.9/5
(36)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)