O'Reilly logo

CISSP Official (ISC)2 Practice Tests by David Seidl, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5 Identity and Access Management (Domain 5)

  1. Which of the following is best described as an access control model that focuses on subjects and identifies the objects that each subject can access?

    1. An access control list
    2. An implicit denial list
    3. A capability table
    4. A rights management matrix
  2. Jim’s organization-wide implementation of IDaaS offers broad support for cloud-based applications. The existing infrastructure for Jim’s company does not use centralized identity services but uses Active Directory for AAA services. Which of the following choices is the best option to recommend to handle the company’s onsite identity needs?

    1. Integrate onsite systems using OAuth.
    2. Use an on-premise third-party identity service.
    3. Integrate onsite ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required