in Education by
_______________ in a system is given so that users can use dedicated parts of the system for which they’ve been given access to. (a) Machine Access Control (b) Mandatory Accounts Control (c) Mandatory Access Control (d) Mandatory Access Controlling I got this question in a job interview. My question is from Linux OS and its Security topic in portion Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
The correct answer is (c) Mandatory Access Control Easiest explanation: Mandatory Access Control is a technique that provides separation of a computer with its OS into several small discrete sections so that the user of a system can only utilize those pieces of a system for which they’ve been given permission to.

Related questions

0 votes
    Most computers have BIOS which can be configured so that it can ask for a password once the system starts. ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
0 votes
    Using VPN, we can access _______________ (a) Access sites that are blocked geographically (b) Compromise other's system ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    A _______________ provides malicious users remote control over the targeted computer. (a) DDoS-Trojan (b) ... -Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
0 votes
    Modern ____________ can even use it to target users with additional advertisements that are customized to the ... Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Use of _______________ can bring external files and worms and virus along with it to the internal systems. (a) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
0 votes
0 votes
    By gaining access to the Trojaned system the attacker can stage different types of attack using that ... Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
...