In this section, we’ve attempted to compile the facts within the exam’s subject areas that you are most likely to need another look at—in other words, the areas of study that you might have highlighted while reading the Study Guide. The title of each highlighted element corresponds to the heading title in the Security+ Exam Study Guide. In this way, if you have a question about a highlight, you can refer back to the corresponding section in the Study Guide. For the most part, the entries under a heading are organized as term lists with main points that you need to memorize for the exam.
This subsection covers a summary of highlights from the "General Security Concepts" section in the Security+ Exam Study Guide.
MAC is usually hardcoded into a device and is nondiscretionary.
MAC is universally applied to all objects.
Administrators or owners of the object cannot change MAC settings.
MAC is also known as label-based access control.
DAC is usually provided by the operating system.
Administrators or owners of objects implement DAC.
DAC makes it possible to change the ownership of objects.
RBAC is used to implement security on objects based on the job functions/roles of users.
It is highly configurable and offers the most flexibility in implementing access control.
It provides simplified and centralized administration of shared resources.