Question 1
In Discretionary Access Control (DAC), who primarily decides who can access a resource?
The operating system kernel
The resource owner
The network firewall
The auditor
Question 2
Which statement best describes Mandatory Access Control (MAC)?
Users are free to share their files with anyone
Permissions are centrally enforced based on security labels and clearances
Access is always granted if the user knows the password
Only physical access is controlled
Question 3
Which environment is most suitable for using MAC instead of DAC?
Personal home laptop
Social media platform
Military or government system with classified data
School library Wi‑Fi
Question 4
Why is DAC considered less secure than MAC?
It cannot use passwords
It never logs access attempts
It requires more encryption keys
Users can share or modify permissions, increasing the chance of misuse or malware spread
Question 5
Which comparison correctly contrasts DAC and MAC?
DAC: based on clearances; MAC: based on usernames
DAC: rigid and complex; MAC: flexible and user‑friendly
DAC: owner‑controlled, identity‑based, flexible; MAC: system‑controlled, label‑based, highly secure
DAC: only for physical access; MAC: only for logical access
There are 5 questions to complete.