MCQ Question Bank-IS-2
MCQ Question Bank-IS-2
2) Which of the following best describes an access control mechanism in which access control
decisions are based on the responsibilities that an individual user or process has in an organization?
3) which of the following best describes an access control mechanism that allows the data owner to
create and administer access control?
4) Which of the following access control methods provides the most granular access to protected
objects?
A) Capabilities
B) Access control lists
C) Permission bits
D) Profiles
5) Which of the following are used to make access decisions in a MAC (Mandatory Access Control)
environment?
6) Which of the following access control methods allows access control decisions to be based on
security labels associated with each data item and each user?
8) Which of the following terms best represents a MAC (Mandatory Access Control) model?
A) Lattice
B) Bell La-Padula
C) BIBA
D) Clark and Wilson
A) asynchronous
B) synchronous
C) cryptographic keys
D) smart cards
10. Which of the following OS does not comes under a secured Linux OS list?
a) Qubes OS
b) Tails
c) Tin Hat
d) Ubuntu
11. ____________ is a Debian-Linux based OS that has 2 VMs (Virtual Machines) that help
in preserving users’ data private.
a) Fedora
b) Ubuntu
c) Whonix
d) Kubuntu
12. Subgraph OS is a Debian based Linux distro which provides hardcore anonymity and is
approved by Edward Snowden.
a) True
b) False
13. Using the ______ account of a UNIX system, one can carry out administrative functions.
a) root
b) administrative
c) user
d) client
14. In your Linux-based system, you have to log-in with your root account for managing any
feature of your system.
a) True
b) False
15. MAC is abbreviated as _______________
a) Machine Access Control
b) Mandatory Accounts Control
c) Mandatory Access Controlling
d) Mandatory Access Control
16. _______________ in a system is given so that users can use dedicated parts of the
system for which they’ve been given access to.
a) Machine Access Control
b) Mandatory Accounts Control
c) Mandatory Access Control
d) Mandatory Access Controlling
17. DTE is abbreviated as ___________________
a) Domain and Type Enforcing
b) Domain and Type Enforcement
c) DNS and Type Enforcement
d) DNS and Type Enforcing
18. RBAC is abbreviated as ______________
a) Rule-Based Accessing Control
b) Role-Based Access Control
c) Rule-Based Access Control
d) Role-Based Accessing Control
19. What is the Bell-Lapadula model?
a) A discretionary access control method
b) A multi user security system
c) A multi level security system
d) A role base access control system
20. What is a Star property rule?
a) If subject wants to read and write to object, then subject clearance and the objects
classification must be equal.
b) A subject cannot read data within an object which is at lower security level
c) A subject cannot write to object which is at higher security level.
d) A subject cannot write to a lower classification.
28. Which Bell-LaPadula property keeps lower-level subjects from accessing objects with a higher
security level?
a) * (star) Security Property
b) No write up property
c) No read up property
d) No read down property
30. From the options below, which of them is not a threat to information security?
a) Disaster
b) Eavesdropping
c) Information leakage
d) Unchanged default password
31. From the options below, which of them is not a vulnerability to information security?
a) flood
b) without deleting data, disposal of storage media
c) unchanged default password
d) latest patches and updates not done
32. _____ platforms are used for safety and protection of information in the cloud.
a) Cloud workload protection platforms
b) Cloud security protocols
c) AWS
d) One Drive
33. Which of the following information security technology is used for avoiding browser-based
hacking?
a) Anti-malware in browsers
b) Remote browser access
c) Adware remover in browsers
d) Incognito mode in a browser
37. In which phase, the hackers install backdoors so that his/her ownership with the victim’s system
can be retained later?
a) Scanning
b) Maintaining access
c) Maintaining Access
d) Gaining access
ANSWERS
1. B 24. A
2. C 25. D
3. B 26. D
4. B 27. A
5. D 28. C
6. A 29. D
7. A 30. D
8. A 31. A
9. A 32. A
10. D 33. B
11. C 34. C
12. A 35. D
13. A 36. A
14. B 37. C
15. D 38. B
16. C 38. B
17. B 40. C
18. B
19. C
20. A
21. A
22. C
23. C