Chapter 5Identity and Access Management (Domain 5)

  1. Which of the following is best described as an access control model that focuses on subjects and identifies the objects that each subject can access?
    1. An access control list
    2. An implicit denial list
    3. A capability table
    4. A rights management matrix
  2. Jim's organization-wide implementation of IDaaS offers broad support for cloud-based applications. Jim's ...

Get (ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.