Chapter 5Identity and Access Management (Domain 5)
- Which of the following is best described as an access control model that focuses on subjects and identifies the objects that each subject can access?
- An access control list
- An implicit denial list
- A capability table
- A rights management matrix
- Jim's organization-wide implementation of IDaaS offers broad support for cloud-based applications. Jim's ...
Get (ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.