Chapter 5 ■ dentity and Access Management (Domain 5)I 107
- What type of access controls allow the owner of a file to grant other users access to it
using an access control list?
A. Role based
B. Nondiscretionary
C. Rule based
D. Discretionary - Alex’s job requires him to see protected health information (PHI) to ensure proper treat-
ment of patients. His access to their medical records does not provide access to patient
addresses or billing information. What access control concept best describes this control?
A. Separation of duties
B. Constrained interfaces
C. Context-dependent control
D. Need to know
Use your knowledge of the Kerberos logon process and the following diagram to answer
questions 17–19.
Client Workstation
A
B
C
Client Workstation
Client Workstation
KDC
KDC
Username and
Password
Services
- At point A in the diagram, the client sends the username and password to the KDC. How
is the username and password protected?
A. 3DES encryption
B. TLS encryption
C. SSL encryption
D. AES encryption