Images

Appendix A

Answers to Review Questions

Domain 1: Access Control Systems and Methodologies

1. Which of the following represents the type of access given to a user?

  1. Permissions

  2. Subjects

  3. Objects

  4. Rights

The correct option is A

Permissions regulate the type of access a subject is given to an object. Common permissions include: read, write, delete, and execute.

2. The most widely adopted access control method is

  1. Discretionary access control.

  2. Mandatory access control.

  3. Rule-based access control.

  4. Role-based access control.

The correct option is A

Discretionary Access Control is the predominant access control technique in use today. Most commodity ...

Get Official (ISC)2® Guide to the ISSAP® CBK, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.