+1 vote
81 views
in Cognitive Radio by (86.8k points)
Which among the following is not a primary rule of role based access control?

(a) Role definition

(b) Role assignment

(c) Role authorization

(d) Permission authorization

The question was asked in a job interview.

This interesting question is from Next Generation Wireless Network in division Next Generation Wireless Network of Cognitive Radio

1 Answer

0 votes
by (65.4k points)

The correct answer is:

(d) Permission authorization

Explanation:

In Role-Based Access Control (RBAC), there are key rules for managing and controlling access based on roles within an organization or system. These primary rules include:

  1. Role definition: Defining the roles in the system. Each role corresponds to a set of permissions or access rights, usually based on job functions.

  2. Role assignment: Assigning specific roles to users or entities. A user can have one or more roles, which determine what actions they can perform in the system.

  3. Role authorization: Determining which roles are allowed to access which resources or actions. This involves defining and enforcing access policies for each role.

Permission authorization, on the other hand, is not a primary rule in RBAC. While roles are assigned permissions, the permission itself is not authorized directly through RBAC rules—permissions are granted to roles, and roles are authorized to perform actions based on the policies set for each role.

Thus, permission authorization (option d) is not a primary rule of role-based access control, and the correct answer is (d).

Related questions

Welcome to TalkJarvis QnA, a question-answer community website for the people by the people. On TalkJarvis QnA you can ask your doubts, curiosity, questions and whatever going in your mind either related to studies or others. Experts and people from different fields will answer.

Most popular tags

biology – class 12 biology – class 11 construction & building materials chemistry – class 12 electronic devices & circuits network theory data structures & algorithms ii cell biology ic engine insurance finance money computational fluid dynamics engineering physics i discrete mathematics chemistry – class 11 aerodynamics casting-forming-welding i engineering mathematics operating system casting-forming-welding ii engineering drawing mysql engineering geology digital circuits wireless mobile energy management electrical measurements digital communications cyber security analytical instrumentation embedded systems electric drives cytogenetics advanced machining computer fundamentals life sciences basic civil engineering iot design of electrical machines physics – class 12 applied chemistry dairy engineering basic chemical engineering cloud computing microprocessor bioinformatics aircraft design aircraft maintenance software engineering drug biotechnology digital signal processing biochemistry data structures & algorithms i automotive engine design avionics engineering material & metallurgy energy engineering cognitive radio unix electrical machines biomedical instrumentation object oriented programming electromagnetic theory power electronics analog communications bioprocess engineering civil engineering drawing engineering metrology physics – class 11 mathematics – class 12 engineering chemistry i basic electrical engineering unit processes mongodb signals and systems cryptograph & network security hadoop mathematics – class 11 engineering physics ii html control systems engineering mechanics antennas analog circuits computer network java sql server javascript concrete technology chemical process calculation artificial intelligence design of steel structures c++ database management computer architecture engineering chemistry ii corrosion engineering chemical technology dc machines
...