Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP-ISSAP All Questions

View all questions & answers for the CISSP-ISSAP exam

Exam CISSP-ISSAP topic 1 question 8 discussion

Actual exam question from ISC's CISSP-ISSAP
Question #: 8
Topic #: 1
[All CISSP-ISSAP Questions]

Mark works as a Network Administrator for NetTech Inc. He wants users to access only those resources that are required for them. Which of the following access control models will he use?

  • A. Policy Access Control
  • B. Mandatory Access Control
  • C. Discretionary Access Control
  • D. Role-Based Access Control
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
byfener
10 months, 2 weeks ago
Selected Answer: D
D. Role-Based Access Control Role-Based Access Control (RBAC) is an access control model that allows access permissions to be assigned based on roles. In RBAC, users are assigned specific roles, and each role has certain permissions associated with it. This model is effective for managing access to resources by ensuring that users have the necessary permissions based on their roles within an organization. Option C, Discretionary Access Control (DAC), also allows users to have control over their own objects and resources, but RBAC is more specifically focused on assigning permissions based on roles rather than individual discretion. So, in the context of Mark wanting users to access only the resources required for their roles, the most appropriate choice is D. Role-Based Access Control.
upvoted 1 times
...
74gjd_37
1 year, 1 month ago
Selected Answer: D
D. RBAC RBAC is a widely-accepted access control model that assigns permissions to users based on their roles within an organization. It allows administrators to define various roles and assign appropriate privileges and access rights to each role. Users are then assigned specific roles, which determine the actions they can perform and the resources they can access. This approach aligns with Mark's objective of granting users only the necessary resources for their job functions while ensuring consistent enforcement of security policies across the network infrastructure. In a mandatory access control model, security labels or classifications are assigned to both subjects (users/processes) and objects (resources). These labels determine the level of access that subjects can have to specific resources. The enforcement of access controls in MAC is typically based on pre-defined system-wide policies. On the other hand, RBAC allows administrators to assign permissions and privileges based on roles rather than individual security labels. Users are then assigned specific roles which grant them appropriate levels of access based on their job functions within the organization.
upvoted 1 times
...
jim22444
1 year, 5 months ago
Selected Answer: B
I would go with B since he doesn't bring up anything related to his duties but just specifies that he only wants users to access what is required... Sounds more granular thatn RBAC
upvoted 1 times
jim22444
1 year, 5 months ago
Didn't notice the "them" in assigning permissions. I would go with RBAC. D
upvoted 1 times
...
74gjd_37
1 year, 1 month ago
Option B is incorrect because Mandatory Access Control (MAC) is typically associated with controlling access to documents or information rather than resources in general. In a MAC model, subjects and objects are given security labels that represent their classification level or sensitivity. These labels determine the level of access and interactions that subjects can have with specific documents or information based on predefined system-wide policies. This type of access control model is commonly used in environments where data confidentiality and integrity are critical, such as government agencies or organizations handling sensitive information. In the context of Mark wanting users to only access necessary resources, MAC would not be directly applicable since it primarily focuses on controlling access to classified documents rather than broader resource management.
upvoted 1 times
...
...
Banzaaai
2 years, 2 months ago
Selected Answer: D
D. Role-Based Access Control only for role
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...