• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/10

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

10 Cards in this Set

  • Front
  • Back
Which of the following implements the authorized access relationship between subjects and
objects of a system?
A. Security model
B. Reference kernel
C. Security kernel
D. Information flow model
C. Security kernel
Which of the following is a means of restricting access to objects based on the identity of the
subject to which they belong?
A. Mandatory access control
B. Group access control
C. Discretionary access control
D. User access control
C. Discretionary access control
What is the method of coordinating access to resources based on the listening of permitted IP
addresses?
A. MAC
B. ACL
C. DAC
D. None of the choices.
B. ACL
Which of the following is true about MAC?
A. It is more flexible than DAC.
B. It is more secure than DAC.
C. It is less secure than DAC.
D. It is more scalable than DAC.
B. It is more secure than DAC.
A system using Discretionary Access Control (DAC) is vulnerable to which one of the following
attacks?
A. Trojan horse
B. Phreaking
C. Spoofing
D. SYN flood
C. Spoofing
What defines an imposed access control level?
A. MAC
B. DAC
C. SAC
D. CAC
A. MAC
DAC are characterized by many organizations as:
A. Need-to-know controls
B. Preventive controls
C. Mandatory adjustable controls
D. None of the choices
A. Need-to-know controls
Which of the following correctly describe DAC?
A. It is the most secure method.
B. It is of the B2 class.
C. It can extend beyond limiting which subjects can gain what type of access to which objects.
D. It is of the B1 class.
C. It can extend beyond limiting which subjects can gain what type of access to which objects.
Under DAC, a subjects rights must be ________ when it leaves an organization altogether.
A. recycled
B. terminated
C. suspended
D. resumed
B. terminated
DAC and MAC policies can be effectively replaced by:
A. Rule based access control.
B. Role based access control.
C. Server based access control.
D. Token based access control
B. Role based access control.