Answer the following statements true (T) or false (F)
1. A user program executes in a kernel mode in which certain areas of memory
are protected from the user’s use and certain instructions may not be executed.
2. Any program that is owned by, and SetUID to, the “superuser” potentially grants unrestricted access to the system to any user executing that program.
3. Traditional RBAC systems define the access rights of individual users and groups of users.
4. A constraint is a defined relationship among roles or a condition related to roles.
5. An ABAC model can define authorizations that express conditions on properties of both the resource and the subject.
11. False
12. True
13. False
14. True
15. True
You might also like to view...
On the motherboard the location of pin 1 might not easily be recognized. If the pin number is not stenciled on the board at the connector site, look for a
A) Red stamp on the board B) Square shaped solder joint on the back of the board at the connector site C) Pin with a shorter length D) Blue stamp on the board
A variant of TLS is ___________________, which provides authentication like SSL/TLS, but does not require a certificate for each user.?
Fill in the blank(s) with the appropriate word(s).