CompTIA Security+ Exam Prep

Category - ID and Access

Once an organization determines it needs to have access control techniques and technologies in place, it must choose which kind. What kind uses specific rules that indicative what can and cannot happen between a subject and an object?
  1. Capability Table
  2. Context-based Access
  3. Rule-based Access
  4. Access Control List
Explanation
Answer: C - Rule-based access uses specific rules that indicative what can and cannot happen between a subject and an object. It is based on the concept of “if X then Y” programming rules, which can be used to provide finer-grained access control to resources. Before a subject can access an object in a certain circumstance, it must meet a set of predefined rules. There are three different access control models. DAC: Data owners decide who has access to resources, and ACLs are used to enforce the security policy. MAC: Operating systems enforce the system’s security policy through the use of security labels. RBAC: Access decisions are based on each subject’s role and/or functional position.
Was this helpful? Upvote!
Login to contribute your own answer or details

Top questions

Related questions

Most popular on PracticeQuiz