1.
What can be defined as a list of subjects along with their access rights that are authorized to access a specific object?
2.
What is the difference between Access Control Lists (ACLs) and Capability Tables?
3.
What can be defined as a table of subjects and objects indicating what actions individual subjects can take upon individual objects?
 
4.
Which access control model is best suited in an environment where a high security level is required and where it is desired that only the administrator grants access control?
5.
Which access control model provides upper and lower bounds of access capabilities for a subject?
6.
How are memory cards and smart cards different?
7.
Why do buffer overflows happen? What is the main cause?
8.
What is the main focus of the Bell-LaPadula security model?
9.
Which of the following statements pertaining to the Bell-LaPadula is TRUE if you are NOT making use of the strong star property?
10.
Which security model introduces access to objects only through programs?