O'Reilly logo

Official (ISC)2® Guide to the ISSAP® CBK, 2nd Edition by ² Corporate

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Images

Appendix A

Answers to Review Questions

Domain 1: Access Control Systems and Methodologies

1. Which of the following represents the type of access given to a user?

  1. Permissions

  2. Subjects

  3. Objects

  4. Rights

The correct option is A

Permissions regulate the type of access a subject is given to an object. Common permissions include: read, write, delete, and execute.

2. The most widely adopted access control method is

  1. Discretionary access control.

  2. Mandatory access control.

  3. Rule-based access control.

  4. Role-based access control.

The correct option is A

Discretionary Access Control is the predominant access control technique in use today. Most commodity ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required