Page 1068 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1068
A. Web server
B. Application
C. Database
D. Programmer
10. Which of the following best describes a rule-based access control
model?
A. It uses local rules applied to users individually.
B. It uses global rules applied to users individually.
C. It uses local rules applied to all users equally.
D. It uses global rules applied to all users equally.
11. What type of access control model is used on a firewall?
A. MAC model
B. DAC model
C. Rule-based access control model
D. RBAC model
12. What type of access controls rely on the use of labels?
A. DAC
B. Nondiscretionary
C. MAC
D. RBAC
13. Which of the following best describes a characteristic of the MAC
model?
A. Employs explicit-deny philosophy
B. Permissive
C. Rule-based
D. Prohibitive
14. Which of the following is not a valid access control model?

