Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

[ Access Control Policy ] Please indicate what security policies can be applied to the following examples: 1 . On your Kali machine, you create

[Access Control Policy]
Please indicate what security policies can be applied to the following examples:
1. On your Kali machine, you create a text file and use 'chmod' command to allow another user to read it.
2. Your host firewall can throttle traffic from/to amazon.com, even the 'admin' user, who wants to access amazon.com, is subject to the mandatory firewall rule.
3. Your program is calculating 5/a. For some reason, the variable 'a' was changed to 0. Your program will be purged due to the 'Divide by 0' exception even you are a super user.
4. On your Kali machine, you create a text file and use 'chmod' command to allow the group user to execute it.
Group of answer choices
1- DAC, 2- MAC, 3- MAC, 4- RBAC
1- RBAC, 2- MAC, 3- MAC, 4- DAC
1- DAC, 2- DAC, 3- MAC, 4- RBAC
1- DAC, 2- MAC, 3- DAC, 4- RBAC

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Entity Alignment Concepts Recent Advances And Novel Approaches

Authors: Xiang Zhao ,Weixin Zeng ,Jiuyang Tang

1st Edition

9819942527, 978-9819942527

More Books

Students also viewed these Databases questions