Exam 4: Access Control

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

__________ access control controls access based on the identity of the requestor and on access rules stating what requestors are or are not allowed to do.

Free
(Short Answer)
4.9/5
(37)
Correct Answer:
Verified

Discretionary

A __________ access control scheme is one in which an entity may be granted access rights that permit the entity, by its own volition, to enable another entity to access some resource.

Free
(Short Answer)
4.9/5
(38)
Correct Answer:
Verified

discretionary

A user may belong to multiple groups.

Free
(True/False)
4.9/5
(36)
Correct Answer:
Verified

True

In digital identity systems, a __________ functions as a certification program.

(Short Answer)
4.8/5
(32)

__________ implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.

(Multiple Choice)
4.9/5
(40)

The authentication function determines who is trusted for a given purpose.

(True/False)
4.9/5
(45)

Role hierarchies make use of the concept of __________ to enable one role to implicitly include access rights associated with a subordinate role.

(Short Answer)
4.8/5
(24)

__________ access control controls access based on the roles that users have within the system and on rules stating what accesses are allowed to users in given roles.

(Short Answer)
4.8/5
(38)

An independent review and examination of system records and activities in order to test for adequacy of system controls, to ensure compliance with established policy and operational procedures, to detect breaches in security, and to recommend any indicated changes in control, policy and procedures is a(n) __________ .

(Short Answer)
4.7/5
(32)

An ABAC model can define authorizations that express conditions onproperties of both the resource and the subject.

(True/False)
5.0/5
(39)

__________ is based on the roles the users assume in a system rather than the user's identity.

(Multiple Choice)
4.8/5
(31)

__________ controls access based on comparing security labels with security clearances.

(Multiple Choice)
4.9/5
(31)

__________ is verification that the credentials of a user or other system entity are valid.

(Multiple Choice)
4.8/5
(38)

A __________ is a mapping between a user and an activated subset of the set of roles to which the user is assigned.

(Short Answer)
4.9/5
(35)

A constraint is a defined relationship among roles or a condition related toroles.

(True/False)
4.9/5
(28)

Any program that is owned by, and SetUID to, the "superuser" potentiallygrants unrestricted access to the system to any user executing that program.

(True/False)
4.8/5
(41)

A concept that evolved out of requirements for military information security is ______ .

(Multiple Choice)
4.9/5
(37)

The principal objectives of computer security are to preventunauthorized users from gaining access to resources, to prevent legitimate users from accessing resources in an unauthorized manner, and to enable legitimate users to access resources in an authorized manner.

(True/False)
4.9/5
(38)

A __________ dictates that a user can only be assigned to a particular role if it is already assigned to some other specified role and can be used to structure the implementation of the least privilege concept.

(Short Answer)
4.9/5
(38)

There are three key elements to an ABAC model: attributes which are defined for entities in a configuration; a policy model, which defines the ABAC policies; and the __________ model, which applies to policies that enforce access control.

(Short Answer)
4.8/5
(35)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)