Question: [ Access Control Policy ] Please indicate what security policies can be applied to the following examples: 1 . On your Kali machine, you create

[Access Control Policy]
Please indicate what security policies can be applied to the following examples:
1. On your Kali machine, you create a text file and use 'chmod' command to allow another user to read it.
2. Your host firewall can throttle traffic from/to amazon.com, even the 'admin' user, who wants to access amazon.com, is subject to the mandatory firewall rule.
3. Your program is calculating 5/a. For some reason, the variable 'a' was changed to 0. Your program will be purged due to the 'Divide by 0' exception even you are a super user.
4. On your Kali machine, you create a text file and use 'chmod' command to allow the group user to execute it.
Group of answer choices
1- DAC, 2- MAC, 3- MAC, 4- RBAC
1- RBAC, 2- MAC, 3- MAC, 4- DAC
1- DAC, 2- DAC, 3- MAC, 4- RBAC
1- DAC, 2- MAC, 3- DAC, 4- RBAC

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!