Question: Access Control Policy ) Please indicate what security policies can be applied to the following examples: 1 . On your Kali machine, you create a

Access Control Policy)Please indicate what security policies can be applied to the following examples:1. On your Kali machine, you create a text file and use 'chmod' command to allow another user to read it.2. Your host firewall can throttle traffic from/to amazon.com, even the 'admin' user, who wants to access amazon.com, is subject to the mandatory firewall rule.3. Your program is calculating 5/a. For some reason, the variable 'a' was changed to 0. Your program will be purged due to the 'Divide by O' exception even you are a super user.4. On your Kali machine, you create a text file and use 'chmod' command to allow the group user to execute it.Select multiple options.A 1- DAC, 2- MAC, 3- MAC, 4- RBACB 1- RBAC, 2- MAC, 3- MAC, 4- DACC 1- DAC, 2- DAC, 3- MAC, 4- RBACD 1- DAC, 2- MAC, 3- DAC, 4- RBAC

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!