CompTIA: Advanced Security Practitioner (CASP) Exam Prep - Question List

Select how would you like to study

46. What does the DAC access control model use to identify the users who have permissions to a resource?
  1. Predefined access privileges
  2. The role or responsibilities users have in the organization
  3. Labels
  4. Access Control Lists
47. What does the MAC access control model use to identify the users who have permission to access a resource?
  1. The role or responsibilities users have in the organization
  2. Labels
  3. Access Control Lists
  4. Predefined access privileges
48. Which of the following access control models allows access control determinations to be performed based on the security labels associated with each user and each data item?
  1. RBAC
  2. DBAC
  3. MAC
  4. DAC
49. Which of the following access control models uses a subject and object label?
  1. DBAC
  2. RBAC
  3. MAC
  4. DAC
50. John’s organization follows a hierarchical approach to data access, with IT personnel having full access, engineering personnel having slightly lesser access and managers having access to only their own department files. Which of the following access control models is in use?
  1. DAC
  2. DBAC
  3. MAC
  4. RBAC

Select how would you like to study