Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
Which of the following controls will you use if you are authorized to access only the information that is essential for your work?
Discretionary access control
Role-based access control
Mandatory access control
Rule-based access control
Role-Based Access Control Systems that employ role-based or task-based access controls define a subject's ability to access an object based on the subject's role or assigned tasks. Roles are commonly identified by job descriptions or work functions. If a subject occupies a management position, it will have greater access to resources than a subject who is in a temporary job. Role-based access controls are useful in dynamic environments with frequent personnel changes because access depends on a role rather than on subject identity.
MAC is more accurately described by this question. Role-based may be associated with least privilege, but MAC is associated with need-to-know. See ISC2 Guide to the CISSP CBK, 4th Ed., pg 711.
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.