Search Header Logo
CISSP Crash Course - Implement and Manage Authorization

CISSP Crash Course - Implement and Manage Authorization

Assessment

Interactive Video

Information Technology (IT), Architecture

University

Practice Problem

Hard

Created by

Wayground Content

FREE Resource

The video tutorial covers various access control frameworks used in authorization, including Discretionary Access Control (DAC), Role-Based Access Control (RBAC), Rule-Based Access Control, Attribute-Based Access Control, Mandatory Access Control (MAC), and Risk-Based Access Control. Each framework is explained with examples, highlighting their unique features and applications. The tutorial also discusses the importance of Multi-Factor Authentication (MFA) in risk-based scenarios to ensure secure access. The session concludes with a summary and a look forward to the next section.

Read more

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary characteristic of discretionary access control (DAC)?

Access is determined by environmental factors.

Access is controlled by the owner or data custodian.

Access is based on the user's role in the organization.

Access is managed by the system administrator.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a hospital setting, how is access typically managed under role-based access control (RBAC)?

Access is the same for all employees.

Access is based on the employee's role, such as doctor or nurse.

Access is determined by the time of day.

Access is controlled by the patient's condition.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What distinguishes rule-based access control from role-based access control?

It is managed by the data custodian.

It is less fine-grained than role-based access control.

It uses classification labels for access.

It uses specific rules and filters to determine access.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does mandatory access control (MAC) organize subjects and objects?

By using discretionary permissions.

By using classification labels and security domains.

By using environmental factors.

By using roles and responsibilities.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What factor is considered in risk-based access control to determine access?

The user's role in the organization.

The ownership of the data.

The environmental context, such as location and time.

The classification label of the data.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?