Which of the following is used for identification? Correct Answer: Username
The Brewer-Nash model is designed primarily to prevent? Correct Answer: Conflicts of interest
In which form of access control environment is access controlled by rules rather than by identity?
Correct Answer: MAC
Which type of access control focuses on assigning privileges based on security clearance and data
sensitivity? Correct Answer: MAC (Mandatory Access Control)
The Clark-Wilson model is primarily based on? Correct Answer: Controlled intermediary access
applications
Which access control model manages rights and permissions based on job descriptions and
responsibilities? Correct Answer: Role Based Access Control (RBAC)
Which of the following is the term for the process of validating a subject's identity? Correct Answer:
Authentication
You have implemented an access control method that allows only users who are managers to access
specific data. Which type of access control model is used? Correct Answer: RBAC (Role-based access
control)
What form of access control is based on job descriptions? Correct Answer: Role-based access control
(RBAC)
You have a system that allows the owner of a file to identify users and their permissions to the file.
Which type of access control model is implemented Correct Answer: DAC (Discretionary Access Control)
Which is the star property of Bell-LaPadula? Correct Answer: No write down
Which of the following defines an object as used in access control? Correct Answer: Data, applications,
systems, networks, and physical space.
Which form of access control enforces security based on user identities and allows individual users to
define access controls over owned resources? Correct Answer: DAC (Discretionary Access Control)
Discretionary Access Control (DAC) manages access to resources using what primary element or aspect?
Correct Answer: Identity