Exam 4: Access Control
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow44 Questions
Exam 11: Software Security43 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls,plans,and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
There are three key elements to an ABAC model: attributes which are defined for entities in a configuration;a policy model,which defines the ABAC policies;and the __________ model,which applies to policies that enforce access control.
(Essay)
4.8/5
(39)
In digital identity systems,a __________ functions as a certification program.
(Essay)
4.8/5
(38)
A __________ dictates that a user can only be assigned to a particular role if it is already assigned to some other specified role and can be used to structure the implementation of the least privilege concept.
(Essay)
4.8/5
(42)
Basic access control systems typically define three classes of subject: owner,__________ and world.
(Essay)
4.9/5
(39)
A __________ access control scheme is one in which an entity may be granted access rights that permit the entity,by its own volition,to enable another entity to access some resource.
(Essay)
4.8/5
(37)
The basic elements of access control are: subject,__________,and access right.
(Essay)
4.9/5
(38)
Traditional RBAC systems define the access rights of individual users and
groups of users.
(True/False)
4.8/5
(40)
__________ access control controls access based on the roles that users have within the system and on rules stating what accesses are allowed to users in given roles.
(Essay)
4.7/5
(36)
__________ refers to setting a maximum number with respect to roles.
(Multiple Choice)
4.9/5
(31)
The default set of rights should always follow the rule of least privilege or
read-only access
(True/False)
4.8/5
(34)
__________ is the traditional method of implementing access control.
(Multiple Choice)
4.8/5
(33)
The three types of attributes in the ABAC model are subject attributes,object attributes,and _________ attributes.
(Essay)
4.8/5
(31)
The principal objectives of computer security are to prevent
unauthorized users from gaining access to resources,to prevent legitimate users from accessing resources in an unauthorized manner,and to enable legitimate users to access resources in an authorized manner.
(True/False)
4.7/5
(41)
__________ access control controls access based on the identity of the requestor and on access rules stating what requestors are or are not allowed to do.
(Essay)
4.8/5
(32)
Role hierarchies make use of the concept of __________ to enable one role to implicitly include access rights associated with a subordinate role.
(Essay)
4.9/5
(38)
An ABAC model can define authorizations that express conditions on
properties of both the resource and the subject.
(True/False)
4.9/5
(32)
The __________ component deals with the management and control of the ways entities are granted access to resources.
(Multiple Choice)
4.8/5
(38)
An access right describes the way in which a subject may access an object.
(True/False)
4.9/5
(43)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)