CISSP Official Study Guide pg 686 - "ABAC models use policies that include multiple attributes for rules. Attributes can be almost any characteristic of users, the network, and devices on the network. For example, user attributes can include group membership, the department where they work, and devices they use such as desktop PCs or mobile devices. The network can be the local internal network, a wireless network, an intranet, or a wide area network (WAN). Devices can include firewalls, proxy servers, web servers, database servers, and more."
ABAC uses a set of attributes to make access decisions. While ABAC is distinct from RBAC and ACL, it can incorporate characteristics from both RBAC, which contributes to the idea of using roles as an attribute. In ABAC, roles are just one of many possible attributes. ACL contributes the concept of explicit permissions, but in ABAC, permissions are granted based on matching attributes rather than just listing users or roles directly.
I picked C from the start.
From Perplexity - While none of the options perfectly describe ABAC, C is the best choice because ABAC can incorporate elements of both RBAC and MAC, depending on how attributes are defined and policies are enforced:
RBAC: ABAC can use roles as one of many attributes for decision-making.
MAC: ABAC can enforce strict access rules based on attributes like security classifications.
ABAC is a more flexible and dynamic model than RBAC or MAC, but since these models can be implemented using attributes, C is the closest match for the CISSP exam.
Deepseek-Role-Based Access Control (RBAC): ABAC extends RBAC by using roles as one of the attributes in its decision-making process.
Mandatory Access Control (MAC): ABAC incorporates policy-driven access decisions, similar to MAC, where access is determined by a central authority based on predefined rules and labels.
While D mentions RBAC (which is relevant to ABAC), the inclusion of ACLs makes it incorrect. Therefore, C is the best choice for the CISSP exam
ACL is a network function and does not take any criteria other than Layer 3 (IP address and port number). ABAC is a combination of RBAC + Policy (say time of the day - MAC strongly adheres to this). Hence C is the option
Answer is C as per: The CISSP Official Study Guide, Domain 5 (Identity and Access Management), describes ABAC as a dynamic access control model that evaluates multiple attributes, integrating principles from RBAC and MAC, but exceeding their capabilities with granular, policy-driven access control. Additionally, NIST SP 800-162 provides guidance on ABAC.
The correct answer is D. Role Based Access Control (RBAC) and Access Control List (ACL) are the attributes used in Attribute Based Access Control (ABAC). RBAC defines access based on a user's job function within an organization and ACL defines access based on a user's identity.
I think this might be a typo. I'm going with Rule-Based Access Control and ACL. My reasoning is backed by the sybex book 9th edition, page 686. Topic on ADAC. ADAC is an advanced form of Rule-Based Access Control . Correct me if i am wrong.
upvoted 3 times
...
This section is not available anymore. Please use the main Exam Page.CISSP Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
RVoigt
Highly Voted 2 years, 1 month agoBigITGuy
Most Recent 1 week, 2 days agocysec_4_lyfe
1 month, 1 week agoPassmi
1 month, 2 weeks agoTuhaar
3 months, 3 weeks agoTuhaar
4 months, 1 week agoklarak
11 months, 3 weeks ago74gjd_37
1 year, 6 months agogeorgegeorge125487
1 year, 7 months agoTygrond87
1 year, 11 months agojackdryan
1 year, 11 months agoiwannapass
2 years, 1 month ago