Which of the following control methods is the administrator using by configuring this policy?

An administrator uses a server with a trusted OS and is configuring an application to go into
production tomorrow, In order to make a new application work properly, the administrator creates
a new policy that labels the application and assigns it a security context within the trusted OS.
Which of the following control methods is the administrator using by configuring this policy?

An administrator uses a server with a trusted OS and is configuring an application to go into
production tomorrow, In order to make a new application work properly, the administrator creates
a new policy that labels the application and assigns it a security context within the trusted OS.
Which of the following control methods is the administrator using by configuring this policy?

A.
Time based access control

B.
Mandatory access control

C.
Role based access control

D.
Rule based access control



Leave a Reply to Leanne Cancel reply7

Your email address will not be published. Required fields are marked *

two + seven =


Leanne

Leanne

He is configuring it so its C

David

David

Technically, you configure any sort of security, so wouldn’t all access controls be role based by that logic?

David

David

This is B – Mandatory Access Control. Assigning a security context such as classified, top secret, confidential, etc. is the definition of Mandatory Access Control.

Lake

Lake

Thanks David. Yes, it is B.

some_coder

some_coder

There is no way this is Role Based Access Control. There is no mention of user group or group policy. This is a label based access control, which is part of MAC.

capt160soar

capt160soar

It’s B. In the question you have some hints. One is a trusted OS the other is he “labels the application and assigns it a security context”.