Recall & Review
beginner
What is capability-based security?
It is a security model where access to resources is controlled by unforgeable tokens called capabilities, which specify the rights a user or process has.
Click to reveal answer
intermediate
How do capabilities differ from traditional access control lists (ACLs)?
Capabilities are tokens held by users or processes granting access, while ACLs list permissions attached to resources. Capabilities move with the user, ACLs stay with the resource.
Click to reveal answer
intermediate
Why are capabilities considered unforgeable?
Because the system ensures capabilities cannot be copied or altered by unauthorized users, often by using protected memory or cryptographic methods.
Click to reveal answer
beginner
Give a real-life example similar to capability-based security.
Like having a hotel room key card that only opens your room. The card (capability) grants you access without needing to check a list every time.
Click to reveal answer
intermediate
What is a key benefit of capability-based security?
It simplifies access control by directly associating rights with tokens, reducing the risk of unauthorized access and making delegation easier.
Click to reveal answer
What does a capability in capability-based security represent?
✗ Incorrect
A capability is a token that grants specific access rights to a resource.
Which of the following is a key feature of capabilities?
✗ Incorrect
Capabilities are designed to be unforgeable to ensure security.
In capability-based security, who holds the capability?
✗ Incorrect
Users or processes hold capabilities that grant them access.
How does capability-based security improve delegation?
✗ Incorrect
Capabilities can be passed or delegated to others, making access control flexible.
Which analogy best describes capability-based security?
✗ Incorrect
A hotel room key card is like a capability granting access to a specific room.
Explain what capability-based security is and how it controls access to resources.
Think about how a token or key can grant access without checking a list.
You got /3 concepts.
Describe the advantages of using capabilities over traditional access control lists.
Consider how capabilities make sharing and controlling access easier.
You got /4 concepts.