An administrator uses a server with a trusted OS and is configuring an application to go into
production tomorrow, In order to make a new application work properly, the administrator creates
a new policy that labels the application and assigns it a security context within the trusted OS.
Which of the following control methods is the administrator using by configuring this policy?
A.
Time based access control
B.
Mandatory access control
C.
Role based access control
D.
Rule based access control
B
0
0
He is configuring it so its C
0
0
Technically, you configure any sort of security, so wouldn’t all access controls be role based by that logic?
0
0
This is B – Mandatory Access Control. Assigning a security context such as classified, top secret, confidential, etc. is the definition of Mandatory Access Control.
0
0
Thanks David. Yes, it is B.
0
0
There is no way this is Role Based Access Control. There is no mention of user group or group policy. This is a label based access control, which is part of MAC.
0
0
It’s B. In the question you have some hints. One is a trusted OS the other is he “labels the application and assigns it a security context”.
0
0