Page 1068 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1068

A.  Web server

                    B.  Application


                    C.  Database
                    D.  Programmer


              10.  Which of the following best describes a rule-based access control
                    model?

                    A.  It uses local rules applied to users individually.

                    B.  It uses global rules applied to users individually.

                    C.  It uses local rules applied to all users equally.

                    D.  It uses global rules applied to all users equally.

               11.  What type of access control model is used on a firewall?

                    A.  MAC model


                    B.  DAC model
                    C.  Rule-based access control model


                    D.  RBAC model

               12.  What type of access controls rely on the use of labels?

                    A.  DAC

                    B.  Nondiscretionary

                    C.  MAC

                    D.  RBAC

               13.  Which of the following best describes a characteristic of the MAC
                    model?


                    A.  Employs explicit-deny philosophy
                    B.  Permissive


                    C.  Rule-based

                    D.  Prohibitive

               14.  Which of the following is not a valid access control model?
   1063   1064   1065   1066   1067   1068   1069   1070   1071   1072   1073