Which of the following is a feature of the Rule based access control? - ProProfs Discuss
Topics
Products
Follow Us:

Which of the following is a feature of the Rule based access control?



A. The use of tokens
B. The use of profiles
C. The use of information flow labels
D. The use of data flow diagrams

This question is part of

CompTIA Security+ Practice Exam (1)
Asked by Denzel, Last updated: Jun 22, 2020

+ Answer
Request

1 Answer

John Smith

John Smith

Answered Sep 08, 2016

The use of profiles-rule based access control is based on a specific profile for each user. information can be easily changed for only one user but this scheme may become a burden in a very large environment. a rule-based access control unit will intercept every request to the server and compare the source specific access conditions with the rights of the user in order to make an access decision. a good example could be a firewall. here a set of rules defined by the network administrator is recorded in a file. every time a connection is attempted (incoming or outgoing), the firewall software checks the rules file to see if the connection is allowed. if it is not, the firewall closes the connection. information flow labels are usually associated with mandatory access control (mac). data flow diagrams are most commonly used in software development, not in rule-based access control. tokens are usually used for authentication, a function which is important for any type of access control.
 

Search for Google images
Select a recommended image
Upload from your computer
Search for Google images
Select a recommended image
Upload from your computer
Search for Google images
Select a recommended image
Upload from your computer

Email Sent
We have sent an email to your address "" with instructions to reset your password.