exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 71 discussion

Actual exam question from ISC's CISSP
Question #: 71
Topic #: 1
[All CISSP Questions]

Which access control method is based on users issuing access requests on system resources, features assigned to those resources, the operational or situational context, and a set of policies specified in terms of those features and context?

  • A. Mandatory Access Control (MAC)
  • B. Attribute Based Access Control (ABAC)
  • C. Role Based Access Control (RBAC)
  • D. Discretionary Access Control (DAC)
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
stickerbush1970
Highly Voted 1 year, 6 months ago
Selected Answer: B
https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-162.pdf
upvoted 6 times
jackdryan
10 months, 3 weeks ago
B is correct
upvoted 1 times
...
...
ServerBrain
Most Recent 2 weeks, 4 days ago
Selected Answer: D
A discretionary access control (DAC) system would show how the owner of the objects allows access, allows owners to determine who can access objects they control.
upvoted 1 times
...
Bach1968
9 months ago
Selected Answer: B
The access control method that is based on users issuing access requests on system resources, features assigned to those resources, the operational or situational context, and a set of policies specified in terms of those features and context is called Attribute Based Access Control (ABAC). In ABAC, access decisions are made based on various attributes or characteristics associated with users, resources, and the environment. These attributes can include user roles, job titles, time of day, location, device type, and any other relevant contextual information. Policies are defined using these attributes, and access requests are evaluated against these policies to determine whether access should be granted or denied. ABAC offers a more flexible and fine-grained access control approach compared to other methods such as Role Based Access Control (RBAC) or Discretionary Access Control (DAC). It allows organizations to define access control policies based on dynamic and contextual factors, providing granular control over resource access and helping to enforce security requirements based on specific conditions.
upvoted 2 times
...
rajkamal0
1 year, 3 months ago
Selected Answer: B
ABAC is the correct answer https://techgenix.com/5-access-control-types-comparison/
upvoted 1 times
...
somkiatr
1 year, 3 months ago
Selected Answer: B
Attribute-based access control (ABAC), also known as policy-based access control for IAM, defines an access control paradigm whereby a subject's authorization to perform a set of operations is determined by evaluating attributes associated with the subject, object, requested operations, and, in some cases, environment attributes.
upvoted 2 times
...
Jamati
1 year, 4 months ago
Selected Answer: B
From Official study guide 9th edition page 682 Attribute-Based Access Control A key characteristic of the Attribute-Based Access Control (ABAC) model is its use of rules that can include multiple attributes. This allows it to be much more flexible than a rule-based access control model that applies the rules to all subjects equally. Many software-defined networks (SDNs) use the ABAC model. Additionally, ABAC allows administrators to create rules within a policy using plain language statements such as “Allow Managers to access the WAN using a mobile device.”
upvoted 2 times
...
rdy4u
1 year, 5 months ago
Attribute-based access control (ABAC) is an authorization model that evaluates attributes (or characteristics), rather than roles, to determine access. The purpose of ABAC is to protect objects such as data, network devices, and IT resources from unauthorized users and actions—those that don’t have “approved” characteristics as defined by an organization’s security policies. https://www.okta.com/blog/2020/09/attribute-based-access-control-abac/
upvoted 1 times
...
franbarpro
1 year, 5 months ago
The question is talking about Zero Trust lol. "B" attribute.
upvoted 1 times
...
Boats
1 year, 5 months ago
Selected Answer: A
Mandatory Access Control 1. Access control policy 2. Classification or sensitivity labels for objects 3. Clearance or privilege labels for subjects
upvoted 2 times
franbarpro
1 year, 5 months ago
MAC is based on lebels - Military fav
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago