Page 1067 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1067

D.  The data custodian

                5.  Which of the following models is also known as an identity-based
                    access control model?


                    A.  DAC

                    B.  RBAC

                    C.  Rule-based access control

                    D.  MAC

                6.  A central authority determines which files a user can access. Which
                    of the following best describes this?

                    A.  An access control list (ACL)

                    B.  An access control matrix

                    C.  Discretionary Access Control model

                    D.  Nondiscretionary access control model


                7.  A central authority determines which files a user can access based
                    on the organization’s hierarchy. Which of the following best
                    describes this?

                    A.  DAC model

                    B.  An access control list (ACL)

                    C.  Rule-based access control model

                    D.  RBAC model

                8.  Which of the following statements is true related to the RBAC

                    model?

                    A.  A RBAC model allows users membership in multiple groups.

                    B.  A RBAC model allows users membership in a single group.

                    C.  A RBAC model is nonhierarchical.

                    D.  A RBAC model uses labels.

                9.  Which of the following is the best choice for a role within an
                    organization using a RBAC model?
   1062   1063   1064   1065   1066   1067   1068   1069   1070   1071   1072