Which of the following is not considered an AAA protocol?
Which of the following is not considered an AAA protocol?
Which of the following best describes the difference between content and context access control?
Which of the following best describes the difference between content and context access control?
Which of the following is not an example of a capability?
Which of the following is not an example of a capability?
What component of Kerberos helps mitigate replay attacks?
What component of Kerberos helps mitigate replay attacks?
Which of thefollowing is the best reason why the group decided upon rule-based?
Tom has led a research group in deciding upon the type of access control thatshould be used in the product their company is planning to develop. Which of thefollowing is the best reason why the group decided upon rule-based?
which of the following models are rights implicitly assigned?
Under which of the following models are rights implicitly assigned?
which of the following?
There has been more of a movement towards role-based access controls inproducts. This model gained acceptance in the 1990s and has recently been integratedinto products more because of which of the following?
Which of thefollowing is not true pertaining to the permissions that can be granted?
Windows and most Linux and Unix systems are based on the DAC model. Which of thefollowing is not true pertaining to the permissions that can be granted?
What type of access control is being used?
An online banking program may allow a customer to view his account balance, butmay not allow the customer to transfer money until he has a certain security levelor access right. What type of access control is being used?
which of the following would be the best model to use?
Acme has the choice of rolling out products that are based on DAC, MAC, orRBAC models. Their security policy indicates that authentication will be identitybased, so which of the following would be the best model to use?