Access Control

0.0(0)
studied byStudied by 1 person
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/14

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

15 Terms

1
New cards
A project manager creates a shared folder and decides which team members can read or edit files. Which access control model is this?
Discretionary Access Control (DAC)
2
New cards
A government agency assigns data classification labels and only users with the right clearance can open certain documents. Which access control model is this?
Mandatory Access Control (MAC)
3
New cards
A hospital’s HR system gives doctors different permissions from nurses, based on their job function. Which access control model is this?
Role-Based Access Control (RBAC)
4
New cards
A cloud service allows login only if the user is in the “Finance” department, is on the corporate network, and is accessing during business hours. Which access control model is this?
Attribute-Based Access Control (ABAC)
5
New cards
A company’s system automatically revokes a user’s access when they transfer to another department. Which type of control or process is this?
Dynamic Access Control (DAC with automatic enforcement)
6
New cards
Two employees must both use their keys to open a secure vault at the same time. What security principle is this?
Two-Person Control
7
New cards
A bank requires two separate people to approve a high-value transaction. What security concept is being applied?
Separation of Duties
8
New cards
An administrator assigns permissions to a “Help Desk” role, then adds new hires to that role so they inherit the permissions. What access control model is this?
Role-Based Access Control (RBAC)
9
New cards
A system checks if a user is logging in from their usual location and blocks access if the location is suspicious. What access concept is this?
Context-aware or Attribute-Based Access Control (ABAC)
10
New cards
A company uses a fingerprint reader to log in to its internal application. What type of access control is this?
Logical (technical) access control using biometric authentication
11
New cards
A security guard checks IDs before letting visitors into a server room. What type of access control is this?
Physical access control
12
New cards
A file owner grants another employee permission to read but not edit a document. What access control model is this?
Discretionary Access Control (DAC)
13
New cards
Access to a nuclear control panel is restricted to users with “Top Secret” clearance, regardless of their job title. What access control model is this?
Mandatory Access Control (MAC)
14
New cards
A university grants access to its library database only to current students, verified by their enrollment status. What access control model is this?
Attribute-Based Access Control (ABAC)
15
New cards
An IT admin creates a “Network Admin” role with permissions to change firewall rules and assigns it to senior engineers. What access control model is this?
Role-Based Access Control (RBAC)