Which access control model is BEST suited in an environ…
Which access control model is BEST suited in an environment where a high security level is required and
where it is desired that only the administrator grants access control?
what actions individual subjects can take upon individu…
What can be defined as a table of subjects and objects indicating what actions individual subjects can take
upon individual objects?
What is the difference between Access Control Lists (AC…
What is the difference between Access Control Lists (ACLs) and Capability Tables?
What can be defined as a list of subjects along with th…
What can be defined as a list of subjects along with their access rights that are authorized to access a specific
object?
Which of the following is NOT part of the Kerberos auth…
Which of the following is NOT part of the Kerberos authentication protocol?
Which access model is most appropriate for companies wi…
Which access model is most appropriate for companies with a high employee turnover?
Which access control model is also called Non-Discretio…
Which access control model is also called Non-Discretionary Access Control (NDAC)?
What is called the type of access control where there a…
What is called the type of access control where there are pairs of elements that have the least upper bound of
values and greatest lower bound of values?
The steps of an access control model should follow whic…
The steps of an access control model should follow which logical flow:
Which of the following statements pertaining to access …
Which of the following statements pertaining to access control is FALSE?
