Difference between DAC and MAC

Last Updated :
Discuss
Comments

Question 1

In Discretionary Access Control (DAC), who primarily decides who can access a resource?

  • The operating system kernel

  • The resource owner

  • The network firewall

  • The auditor

Question 2

Which statement best describes Mandatory Access Control (MAC)?

  • Users are free to share their files with anyone

  • Permissions are centrally enforced based on security labels and clearances

  • Access is always granted if the user knows the password

  • Only physical access is controlled

Question 3

Which environment is most suitable for using MAC instead of DAC?

  • Personal home laptop

  • Social media platform

  • Military or government system with classified data

  • School library Wi‑Fi

Question 4

Why is DAC considered less secure than MAC?

  • It cannot use passwords

  • It never logs access attempts

  • It requires more encryption keys

  • Users can share or modify permissions, increasing the chance of misuse or malware spread

Question 5

Which comparison correctly contrasts DAC and MAC?

  • DAC: based on clearances; MAC: based on usernames

  • DAC: rigid and complex; MAC: flexible and user‑friendly

  • DAC: owner‑controlled, identity‑based, flexible; MAC: system‑controlled, label‑based, highly secure

  • DAC: only for physical access; MAC: only for logical access

There are 5 questions to complete.

Take a part in the ongoing discussion