Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

[ Access Control Policy ] Please indicate what security policies can be applied to the following examples: 1 . On your Kali machine, you create

[Access Control Policy]
Please indicate what security policies can be applied to the following examples:
1. On your Kali machine, you create a text file and use 'chmod' command to allow another user to read it.
2. Your host firewall can throttle traffic from/to amazon.com, even the 'admin' user, who wants to access amazon.com, is subject to the mandatory firewall rule.
3. Your program is calculating 5/a. For some reason, the variable 'a' was changed to 0. Your program will be purged due to the 'Divide by 0' exception even you are a super user.
4. On your Kali machine, you create a text file and use 'chmod' command to allow the group user to execute it.
Group of answer choices
1- DAC, 2- MAC, 3- MAC, 4- RBAC
1- RBAC, 2- MAC, 3- MAC, 4- DAC
1- DAC, 2- DAC, 3- MAC, 4- RBAC
1- DAC, 2- MAC, 3- DAC, 4- RBAC

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Master The Art Of Data Storytelling With Visualizations

Authors: Alexander N Donovan

1st Edition

B0CNMD9QRD, 979-8867864248

More Books

Students also viewed these Databases questions

Question

3. Provide a synthesis for the reactions below. (2 pt)

Answered: 1 week ago

Question

4. Explain the strengths and weaknesses of each approach.

Answered: 1 week ago

Question

3. Identify the methods used within each of the three approaches.

Answered: 1 week ago