Network Defense Essentials (NDE) Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Study for the Network Defense Essentials Exam. Prepare with flashcards and multiple choice questions, each question offers hints and explanations. Get ready for your exam and enhance your cybersecurity skills!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What kind of authorization maintains a separate database for each resource?

  1. Centralized authorization

  2. Decentralized authorization

  3. Role-based authorization

  4. Dynamic authorization

The correct answer is: Decentralized authorization

Decentralized authorization is characterized by the maintenance of separate databases for each resource or system. This approach allows each resource to have its own distinct set of access control policies and user permissions managed independently. In a decentralized model, each system or resource, such as an application or a network segment, can enforce its own authorization decisions based on its unique requirements. This establishes greater autonomy in managing permissions, allowing different teams or departments to tailor access controls suited to their specific needs and security considerations. This method contrasts with centralized authorization, where a single database or service would manage permissions across multiple resources, potentially creating a single point of failure and requiring management to ensure the central database reflects the needs of all connected systems. Role-based authorization focuses on defining roles within a system to assign permissions accordingly, rather than maintaining separate databases for resources. Dynamic authorization involves adjusting access rights in real-time based on contextual information, which does not specifically relate to managing separate databases for each resource.