Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Access Control Policy ) Please indicate what security policies can be applied to the following examples: 1 . On your Kali machine, you create a

Access Control Policy)Please indicate what security policies can be applied to the following examples:1. On your Kali machine, you create a text file and use 'chmod' command to allow another user to read it.2. Your host firewall can throttle traffic from/to amazon.com, even the 'admin' user, who wants to access amazon.com, is subject to the mandatory firewall rule.3. Your program is calculating 5/a. For some reason, the variable 'a' was changed to 0. Your program will be purged due to the 'Divide by O' exception even you are a super user.4. On your Kali machine, you create a text file and use 'chmod' command to allow the group user to execute it.Select multiple options.A 1- DAC, 2- MAC, 3- MAC, 4- RBACB 1- RBAC, 2- MAC, 3- MAC, 4- DACC 1- DAC, 2- DAC, 3- MAC, 4- RBACD 1- DAC, 2- MAC, 3- DAC, 4- RBAC

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Climate And Environmental Database Systems

Authors: Michael Lautenschlager ,Manfred Reinke

1st Edition

1461368332, 978-1461368335

More Books

Students also viewed these Databases questions

Question

Are there any questions that you want to ask?

Answered: 1 week ago