Answer the following statements true (T) or false (F)

1. A user program executes in a kernel mode in which certain areas of memory
are protected from the user’s use and certain instructions may not be executed.
2. Any program that is owned by, and SetUID to, the “superuser” potentially grants unrestricted access to the system to any user executing that program.
3. Traditional RBAC systems define the access rights of individual users and groups of users.
4. A constraint is a defined relationship among roles or a condition related to roles.
5. An ABAC model can define authorizations that express conditions on properties of both the resource and the subject.


11. False
12. True
13. False
14. True
15. True

Computer Science & Information Technology

You might also like to view...

What will be the results after the following code is executed?

``` int[] x = { 55, 33, 88, 22, 99, 11, 44, 66, 77 }; int a = 10; if(x[2] > x[5]) a = 5; else a = 8; ``` a. a = 5 b. a = 8 c. a = 10 d. a = 13

Computer Science & Information Technology

Write a for loop to print the multiples of 3 from 300 down to 3.

What will be an ideal response?

Computer Science & Information Technology

You can configure the sudoers file so that the sudo command doesn't prompt users for the root password.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following authentication types has the weakest form of encryption?

a. Basic b. Message digest c. Certificate-based d. Form-based

Computer Science & Information Technology