0
0
Cybersecurityknowledge~20 mins

Access control models (MAC, DAC, ABAC) in Cybersecurity - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
Access Control Mastery
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
Understanding Mandatory Access Control (MAC)

Which statement best describes how Mandatory Access Control (MAC) manages access permissions?

AAccess decisions are based on labels assigned to users and resources, enforced by the system.
BUsers can set access permissions on their own files and resources.
CAccess is granted based on user roles and their assigned permissions.
DAccess permissions are granted dynamically based on user attributes and environmental conditions.
Attempts:
2 left
💡 Hint

Think about who controls the access rules in MAC.

📋 Factual
intermediate
2:00remaining
Discretionary Access Control (DAC) Characteristics

Which of the following is a key characteristic of Discretionary Access Control (DAC)?

AAccess is determined by matching user attributes to policies.
BAccess rights are assigned by a central authority and cannot be changed by users.
CUsers have the ability to grant or revoke access to resources they own.
DAccess decisions are based on predefined security labels.
Attempts:
2 left
💡 Hint

Consider who controls permissions in DAC.

🔍 Analysis
advanced
2:00remaining
Comparing ABAC with DAC and MAC

Which feature uniquely distinguishes Attribute-Based Access Control (ABAC) from both DAC and MAC?

AUsers can freely assign permissions to their resources.
BAccess is granted based on evaluating multiple attributes of users, resources, and environment dynamically.
CAccess permissions are static and cannot change during a session.
DAccess decisions are based on fixed security labels assigned by the system.
Attempts:
2 left
💡 Hint

Think about how ABAC uses information beyond just ownership or labels.

Reasoning
advanced
2:00remaining
Identifying Access Control Model by Scenario

A company enforces access where only users with a security clearance level equal to or higher than the document's classification can view it. Users cannot change these permissions. Which access control model is this?

ARole-Based Access Control (RBAC)
BAttribute-Based Access Control (ABAC)
CDiscretionary Access Control (DAC)
DMandatory Access Control (MAC)
Attempts:
2 left
💡 Hint

Consider who controls the permissions and how they are enforced.

Comparison
expert
2:00remaining
Evaluating Access Control Models for Dynamic Environments

In a cloud environment where access must adapt to changing user roles, device security status, and time of day, which access control model is most suitable?

AAttribute-Based Access Control (ABAC)
BMandatory Access Control (MAC)
CDiscretionary Access Control (DAC)
DRole-Based Access Control (RBAC)
Attempts:
2 left
💡 Hint

Think about which model supports flexible, attribute-driven decisions.