Exam 4: Access Control

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

__________ is the traditional method of implementing access control.

(Multiple Choice)
4.8/5
(32)

Access control is the central element of computer security.

(True/False)
4.8/5
(42)

An access right describes the way in which a subject may access an object.

(True/False)
4.9/5
(35)

The default set of rights should always follow the rule of least privilege orread-only access

(True/False)
4.8/5
(40)

The final permission bit is the _________ bit.

(Multiple Choice)
4.9/5
(45)

A __________ is a named job function within the organization that controls this computer system.

(Multiple Choice)
4.8/5
(44)

Security labels indicate which system entities are eligible to access certainresources.

(True/False)
4.8/5
(40)

Basic access control systems typically define three classes of subject: owner, __________ and world.

(Short Answer)
4.9/5
(38)

__________ provide a means of adapting RBAC to the specifics of administrative and security policies in an organization.

(Multiple Choice)
5.0/5
(33)

Reliable input is an access control requirement.

(True/False)
4.7/5
(34)

A __________ is an entity capable of accessing objects.

(Multiple Choice)
4.8/5
(40)

A(n) __________ is a resource to which access is controlled.

(Multiple Choice)
4.8/5
(43)

The three types of attributes in the ABAC model are subject attributes, object attributes, and _________ attributes.

(Short Answer)
4.8/5
(41)

The basic elements of access control are: subject, __________, and access right.

(Short Answer)
4.8/5
(43)

Subject attributes, object attributes and environment attributes are the three types of attributes in the __________ model.

(Multiple Choice)
4.8/5
(35)

A user program executes in a kernel mode in which certain areas of memoryare protected from the user's use and certain instructions may not be executed.

(True/False)
4.7/5
(38)

An auditing function monitors and keeps a record of user accesses tosystem resources.

(True/False)
4.9/5
(38)

Traditional RBAC systems define the access rights of individual users andgroups of users.

(True/False)
4.7/5
(42)

The __________ component deals with the management and control of theways entities are granted access to resources.

(Multiple Choice)
4.9/5
(38)

The __________ user ID is exempt from the usual file access control constraints and has system wide access.

(Short Answer)
4.8/5
(39)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)