Question 1
What is the main idea behind Role-Based Access Control (RBAC)?
Every user gets full admin rights
Permissions are assigned directly to each individual user
Access is granted based on predefined roles linked to job functions
Access is random and temporary
Question 2
Which of the following is NOT a core component of RBAC?
Users
Roles
Permissions
IP addresses
Question 3
Why is RBAC especially useful in large organizations?
It removes the need for authentication
It lets every user create their own permissions
It simplifies managing thousands of users by assigning rights through roles instead of per user
It focuses only on physical access
Question 4
In the university portal example, which role should have permissions to “manage student records and enrollment”?
Student
Professor
Registrar
IT Admin
Question 5
When a user tries to perform an action in an RBAC system, what check does the system perform to decide if access is allowed?
Whether the user knows the database password
Whether the user’s IP address is static
Whether the user has been online for more than an hour
Whether the user’s assigned role includes the required permission for that action
There are 5 questions to complete.