Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 386 discussion

Actual exam question from ISC's CISSP
Question #: 386
Topic #: 1
[All CISSP Questions]

Which of the following access control mechanisms characterized subjects and objects using a set of encoded security-relevant properties?

  • A. Mandatory access control (MAC)
  • B. Role-based access control (RBAC)
  • C. Attribute-based access control (ABAC)
  • D. Discretionary access control (DAC)
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
CCNPWILL
5 months, 3 weeks ago
Selected Answer: C
Subject and object is language relevant to attribute-based authN
upvoted 1 times
...
GuardianAngel
9 months, 2 weeks ago
Also same info at: https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-162.pdf Guide to Attribute Based Access Control (ABAC) Definition and Considerations
upvoted 3 times
...
GuardianAngel
9 months, 2 weeks ago
ANSWER: C Attribute-based access control (ABAC) attribute-based access control (ABAC), attribute based access control - A mechanism of assigning access and privileges to resources through a scheme of attributes or characteristics. The attributes can be related to the user, the object, the system, the application, the network, the service, time of day, or even other subjective environmental concerns. See also discretionary access control (DAC), mandatory access control (MAC), role-based access control (RBAC, RoBAC, or role-BAC), and rule-based access control (RuBAC, Rule-BAC). OFFICIAL ISC2 STUDY GUIDE GLOSSARY pg 15
upvoted 3 times
...
GPrep
10 months, 2 weeks ago
Selected Answer: A
Mandatory Access Control   A key characteristic of the Mandatory Access Control (MAC) model is the use of labels applied to both subjects and objects. For example, if a user has a label of top secret, the user can be granted access to a top-secret document. In this example, both the subject and the object have matching labels. When documented in a table, the MAC model sometimes resembles a lattice (such as one used for a climbing rosebush), so it is referred to as a lattice-based model. Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (Sybex Study Guide) (p. 682). Wiley. Kindle Edition.
upvoted 2 times
...
YesPlease
11 months, 1 week ago
Selected Answer: C
Answer C) ABAC MAC, DAC and RBAC all pertain to only the subjects https://www.okta.com/blog/2020/09/attribute-based-access-control-abac/
upvoted 1 times
...
Soleandheel
11 months, 2 weeks ago
C. Attribute-based access control (ABAC) Attribute-based access control (ABAC) uses attributes associated with subjects, objects, and the environment to make access control decisions. These attributes can include user roles, time of day, location, and other context-specific information. ABAC provides a flexible and dynamic way to define access policies based on various attributes, making it suitable for complex access control scenarios.
upvoted 1 times
...
InclusiveSTEAM
1 year, 1 month ago
C is the answer ABAC defines access control policies based on assigned attributes of subjects (users/processes) and objects (resources). These attributes, like role, clearance, project, etc. are used to determine access rather than identities alone. Mandatory AC (MAC) uses labels and clearances. Role-based AC (RBAC) uses roles. Discretionary AC (DAC) uses access control lists.
upvoted 1 times
...
BoyBastos
1 year, 2 months ago
Selected Answer: C
C. Attribute-based access control (ABAC) Attribute-based access control (ABAC) is an access control mechanism that characterizes subjects (users, processes) and objects (resources) using a set of encoded security-relevant attributes or properties. ABAC allows for fine-grained access control decisions based on various attributes such as user roles, resource classifications, time of access, and other contextual information. This flexibility in defining access policies makes ABAC suitable for complex and dynamic access control scenarios.
upvoted 1 times
...
Goseu
1 year, 7 months ago
Selected Answer: C
It’s C
upvoted 1 times
jackdryan
1 year, 6 months ago
A is correct
upvoted 1 times
...
...
Delab202
1 year, 7 months ago
Selected Answer: A
The access control mechanism that characterizes subjects and objects using a set of encoded security-relevant properties is known as the Mandatory Access Control (MAC) mechanism. In this mechanism, every subject and object is assigned a security label, which consists of a set of encoded security properties. These security properties are used to determine whether a subject is allowed to access an object or not. The security labels are typically defined by a system administrator and are based on a security policy. The security policy specifies the rules and guidelines for access control in the system. MAC is commonly used in environments that require a high level of security, such as military and government organizations. It is also used in systems that process sensitive or confidential information.
upvoted 2 times
...
jbell
1 year, 7 months ago
Selected Answer: C
Historically, access control models have included mandatory access control (MAC), discretionary access control (DAC), and more recently role-based access control (RBAC). These access control models are user-centric and do not take into account additional parameters such as resource information, the relationship between the user (the requesting entity) and the resource, and dynamic information, e.g. time of the day or user IP. ABAC tries to address this by defining access control based on attributes which describe the requesting entity (the user), the targeted object or resource, the desired action (view, edit, delete), and environmental or contextual information. This is why access control is said to be attribute-based. https://en.wikipedia.org/wiki/Attribute-based_access_control
upvoted 2 times
...
[Removed]
1 year, 7 months ago
Selected Answer: C
I would go for C, ABAC. The encoded properties are the defined objects (i.e. 18+, drivers license etc).
upvoted 1 times
...
SpaceMonkey1
1 year, 7 months ago
Selected Answer: A
It's A, Mandatory access control is a method of limiting access to resources based on the sensitivity of the information that the resource contains and the authorization of the user to access information with that level of sensitivity.
upvoted 2 times
...
Ernestokoro
1 year, 8 months ago
I go with Option A. what are the security relevant properties if I may ask? Are they not they not the Security classifications in MAC? Top Secret, Secret etc...
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...