0
0
Cybersecurityknowledge~10 mins

Access control models (MAC, DAC, ABAC) in Cybersecurity - Interactive Code Practice

Choose your learning style9 modes available
Practice - 5 Tasks
Answer the questions below
1fill in blank
easy

Complete the code to identify the access control model where the system enforces policies without user discretion.

Cybersecurity
The access control model where the system strictly enforces policies is called [1].
Drag options to blanks, or click blank then click option'
ARBAC
BMAC
CABAC
DDAC
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing MAC with DAC, which allows user discretion.
2fill in blank
medium

Complete the sentence to describe the access control model where users control access to their own resources.

Cybersecurity
In the [1] model, users decide who can access their resources.
Drag options to blanks, or click blank then click option'
ADAC
BMAC
CABAC
DRBAC
Attempts:
3 left
💡 Hint
Common Mistakes
Mixing up DAC with MAC, which is system-enforced.
3fill in blank
hard

Fix the error in the description of the ABAC model by selecting the correct missing word.

Cybersecurity
ABAC stands for Attribute-Based [1] Control, which grants access based on user and resource attributes.
Drag options to blanks, or click blank then click option'
AAccounting
BAuthorization
CAuthentication
DAccess
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing 'Authorization' which is related but not the exact term in ABAC.
4fill in blank
hard

Fill all three blanks to complete the sentence describing the difference between MAC and DAC.

Cybersecurity
In [1], access is controlled by the system, while in [2], access is controlled by the [3].
Drag options to blanks, or click blank then click option'
AMAC
BDAC
Cuser
Dadministrator
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing which model is system-controlled and which is user-controlled.
5fill in blank
hard

Fill all three blanks to complete the ABAC example code snippet.

Cybersecurity
access_granted = (user.[1] == 'manager') and (resource.[2] == 'confidential') and (environment.[3] == 'office')
Drag options to blanks, or click blank then click option'
Arole
Bclassification
Clocation
Ddepartment
Attempts:
3 left
💡 Hint
Common Mistakes
Mixing up attribute names or using unrelated terms.