Role-Based Access Control

Last Updated :
Discuss
Comments

Question 1

What is the main idea behind Role-Based Access Control (RBAC)?

  • Every user gets full admin rights

  • Permissions are assigned directly to each individual user

  • Access is granted based on predefined roles linked to job functions

  • Access is random and temporary

Question 2

Which of the following is NOT a core component of RBAC?

  • Users

  • Roles

  • Permissions

  • IP addresses

Question 3

Why is RBAC especially useful in large organizations?

  • It removes the need for authentication

  • It lets every user create their own permissions

  • It simplifies managing thousands of users by assigning rights through roles instead of per user

  • It focuses only on physical access

Question 4

In the university portal example, which role should have permissions to “manage student records and enrollment”?

  • Student

  • Professor

  • Registrar

  • IT Admin

Question 5

When a user tries to perform an action in an RBAC system, what check does the system perform to decide if access is allowed?

  • Whether the user knows the database password

  • Whether the user’s IP address is static

  • Whether the user has been online for more than an hour

  • Whether the user’s assigned role includes the required permission for that action

There are 5 questions to complete.

Take a part in the ongoing discussion