Page 1067 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1067
D. The data custodian
5. Which of the following models is also known as an identity-based
access control model?
A. DAC
B. RBAC
C. Rule-based access control
D. MAC
6. A central authority determines which files a user can access. Which
of the following best describes this?
A. An access control list (ACL)
B. An access control matrix
C. Discretionary Access Control model
D. Nondiscretionary access control model
7. A central authority determines which files a user can access based
on the organization’s hierarchy. Which of the following best
describes this?
A. DAC model
B. An access control list (ACL)
C. Rule-based access control model
D. RBAC model
8. Which of the following statements is true related to the RBAC
model?
A. A RBAC model allows users membership in multiple groups.
B. A RBAC model allows users membership in a single group.
C. A RBAC model is nonhierarchical.
D. A RBAC model uses labels.
9. Which of the following is the best choice for a role within an
organization using a RBAC model?

