
Secure Computer Systems - Quizzes

Quiz
•
Other
•
University
•
Medium
Sarah Reid
Used 9+ times
FREE Resource
60 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
SELinux extends standard Linux access control by offering the following additional mechanisms.
A SELinux user id that is separate from the standard Linux user id.
Mandatory access control.
New access checks that are not performed in Linux.
All of the above.
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Security context in SELinux can be associated with
only subjects/users.
only objects.
either with a user or objects owned by him/her but not both.
both subjects and objects.
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
The following is not an example of what is included in an object's security context.
Object's ACL.
Object's type used for type enforcement.
Object's user.
Object's multi-level security range.
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Type enforcement (TE) access rules in SELinux allow policies to be defined that can limit access to objects based on
time of the request made by the requestor.
operation of the object called by the requestor (e.g., read on a file).
previously called operations by the requestor.
all of the above.
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Assume SELinux kernel includes MyLSM Linux security module (LSM). However, no functions implemented by MyLSM are called when a certain file is accessed. This could be due to the following reason(s).
standard discretionary access check on the file request fails.
the access vector check contains no permissions for the file.
the policy database does not specify permissions for the file.
the policy file specifies no access for the file.
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
The implementation of the Bell and La Padula model in SELinux allows
only a single sensitivity level to be associated with a user/object.
writes to be done only at the level of the user.
reads to be done only at the level of the user.
none of the above.
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
SELinux policy rules specify
access checks.
inheritance.
overrides.
all of the above.
Create a free account and access millions of resources
Similar Resources on Wayground
65 questions
IT Essential - Exam

Quiz
•
University
55 questions
Quiz. Don't answer if you haven't studied yet. 1 attempt only

Quiz
•
University
60 questions
iss midterm

Quiz
•
University
58 questions
Tích Hợp Hệ Thống

Quiz
•
University
63 questions
hospitality technology quiz 8

Quiz
•
University
60 questions
BDA 3

Quiz
•
University
63 questions
Computer Networking Quiz

Quiz
•
University
60 questions
Video Content and AI Quiz

Quiz
•
University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Other
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)

Quiz
•
8th Grade - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
36 questions
Unit 5 Key Terms

Quiz
•
11th Grade - University
7 questions
Figurative Language: Idioms, Similes, and Metaphors

Interactive video
•
4th Grade - University
15 questions
Properties of Equality

Quiz
•
8th Grade - University
38 questions
WH - Unit 3 Exam Review*

Quiz
•
10th Grade - University
21 questions
Advise vs. Advice

Quiz
•
6th Grade - University
12 questions
Reading a ruler!

Quiz
•
9th Grade - University