Appendix A
Answers to Review Questions
Domain 1: Access Control Systems and Methodologies
1. Which of the following represents the type of access given to a user?
Permissions
Subjects
Objects
Rights
The correct option is A
Permissions regulate the type of access a subject is given to an object. Common permissions include: read, write, delete, and execute.
2. The most widely adopted access control method is
Discretionary access control.
Mandatory access control.
Rule-based access control.
Role-based access control.
The correct option is A
Discretionary Access Control is the predominant access control technique in use today. Most commodity ...
Get Official (ISC)2® Guide to the ISSAP® CBK, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.