Authorization Multiple Choice Questions
Authorization Multiple Choice Questions
a) Authentication
b) Authorization
c) Identification
d) Recognition
Access Control Lists (ACLs) and Capabilities (C-lists) are derived from:
a) Authentication protocols
b) Authorization matrices
a) Rows
b) Columns
c) Cells
d) Elements
Capabilities store access control matrix information by:
a) Columns
b) Rows
c) Cells
d) Elements
b) In opposite directions
c) Upward
d) Downward
The "confused deputy" scenario illustrates a classic security problem related to:
a) Authentication failures
b) Authorization bypass
d) Insider threats
In the "confused deputy" scenario, what role does the compiler play?
a) Authorized user
b) Unauthorized user
c) Confused deputy
What is one advantage of Capabilities over ACLs in preventing the "confused deputy" problem?
a) Bell-LaPadula
b) Biba
c) Clark-Wilson
d) Brewer-Nash
According to the Simple Security Condition in Bell-LaPadula, what must be true for a subject to read
an object?
a) L(S) ≤ L(O)
b) L(O) ≤ L(S)
c) I(S) ≤ I(O)
d) I(O) ≤ I(S)
a) It lacks simplicity
c) It is too restrictive
d) It is too trivial
b) Integrity
c) Availability
d) Authentication
a) I(O) ≤ I(S)
b) I(S) ≤ I(O)
c) L(S) ≤ L(O)
d) L(O) ≤ L(S)
a) Horizontally
b) Vertically
c) Diagonally
d) Radially
a) Horizontally
b) Vertically
c) Diagonally
d) Laterally
c) Corporate intranets
a) Bell-LaPadula
b) Biba
c) Clark-Wilson
d) Brewer-Nash
a) Confidentiality
b) Integrity
c) Availability
d) Accountability
a) Restricted
b) Confidential
c) Secret
d) Public
In MLS, which clearance level allows access to the most sensitive information?
a) Restricted
b) Confidential
c) Secret
d) Top Secret
a) Educational settings
b) Commercial enterprises
d) Public libraries
a) Authenticating users
b) Authorizing actions
Access Control Lists (ACLs) are primarily associated with which concept?
a) Authentication
b) Authorization
c) Identification
d) Recognition
b) Authentication protocols
a) Rows
b) Columns
c) Cells
d) Elements
a) By columns
b) By rows
c) By cells
d) By elements
What is the primary reason for managing access control matrices efficiently?
b) In opposite directions
c) Upward
d) Downward
a) Authentication failures
b) Authorization bypass
d) Insider threats
a) Compiler
b) Authorized user
c) Unauthorized user
a) Confidentiality
b) Integrity
c) Availability
d) Authentication
According to the Simple Security Condition in Bell-LaPadula, what must be true for a subject to read
an object?
a) L(S) ≤ L(O)
b) L(O) ≤ L(S)
c) I(S) ≤ I(O)
d) I(O) ≤ I(S)
a) It lacks simplicity
c) It is too restrictive
d) It is too trivial
a) Confidentiality
b) Integrity
c) Availability
d) Authentication
According to Biba's model, what must be true for a subject to write to an object?
a) I(O) ≤ I(S)
b) I(S) ≤ I(O)
c) L(S) ≤ L(O)
d) L(O) ≤ L(S)
a) Horizontally
b) Vertically
c) Diagonally
d) Radially
a) Horizontally
b) Vertically
c) Diagonally
d) Laterally
a) Educational settings
b) Commercial enterprises
d) Public libraries
b) Biba
c) Clark-Wilson
d) Brewer-Nash
a) Educational settings
b) Commercial enterprises
d) Public libraries
a) Authenticating users
b) Authorizing actions
In Biba's security model, what must be true for a subject to read an object?
a) I(S) ≤ I(O)
b) I(O) ≤ I(S)
c) L(S) ≤ L(O)
d) L(O) ≤ L(S)
a) Restricted
b) Confidential
c) Secret
d) Public
Which clearance level allows access to the most sensitive information in MLS?
a) Restricted
b) Confidential
c) Secret
d) Top Secret
a) Confidentiality
b) Integrity
c) Availability
d) Authenticity
In MLS, which type of controls are used to enforce restrictions across security levels?
a) Classified government/military
b) Public libraries
c) Corporate offices
d) Retail stores
a) Confidentiality
b) Integrity
c) Availability
d) Authentication
According to Biba's model, what must be true for a subject to write to an object?
a) I(O) ≤ I(S)
b) I(S) ≤ I(O)
c) L(S) ≤ L(O)
d) L(O) ≤ L(S)
a) Confidentiality
b) Integrity
c) Availability
d) Authentication
a) Restricted
b) Confidential
c) Secret
d) Public
In MLS, which clearance level allows access to the most sensitive information?
a) Restricted
b) Confidential
c) Secret
d) Top Secret
a) Confidentiality
b) Integrity
c) Availability
d) Authenticity