Which of the following is an example of an active attack?
Which of the following is an example of an active attack? Select one.
What attack involves actions to mimic one’s identity?
What attack involves actions to mimic one’s identity?
what subjects can access specific resources?
Which access control model enables the owner of the resource to specify what subjects can
access specific resources?
The type of discretionary access control that is based on an individual’s identity is called:
The type of discretionary access control that is based on an individual’s identity is called:
Which of the following access control types gives “UPDATE” privileges on Structured Query Language (SQL) d
Which of the following access control types gives “UPDATE” privileges on Structured Query
Language (SQL) database objects to specific users or groups?
what privilege they have?
With Discretionary access controls, who determines who has access and what privilege they
have?
What defines an imposed access control level?
What defines an imposed access control level?
Under MAC, who can change the category of a resource?
Under MAC, who can change the category of a resource?
Under MAC, who may grant a right of access that is explicitly forbidden in the access control policy?
Under MAC, who may grant a right of access that is explicitly forbidden in the access control
policy?
You may describe MAC as:
You may describe MAC as: