Access Control Techniques - SSCP Exam: ISC - Premier Security Administrator Certification

Access Control Techniques

Prev Question Next Question

Question

Access Control techniques do not include which of the following choices?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

A.

Access Control Techniques - Discretionary Access Control - Mandatory Access Control - Lattice Based Access Control - Rule-Based Access Control - Role-Based Access Control - Source: DUPUIS, Clement, Access Control Systems and Methodology, Version 1, May 2002, CISSP Open Study Group Study Guide for Domain 1, Page 13.

Access control techniques are used to ensure that only authorized individuals or processes can access specific resources, data or systems. There are several access control techniques used in the field of security administration, including:

A. Relevant Access Controls: Relevant access controls are used to control access to resources based on the user's context, such as their location, time of day, device, and so on. Relevant access controls are often used in conjunction with other access control techniques.

B. Discretionary Access Control: Discretionary access control (DAC) is a type of access control where the resource owner determines who is granted access to the resource. The resource owner has complete control over access to the resource, and can grant or revoke access as necessary.

C. Mandatory Access Control: Mandatory access control (MAC) is a type of access control where access is granted based on a set of rules or policies that are defined by a central authority. In a MAC system, access is granted or denied based on a user's security clearance and the classification of the resource.

D. Lattice-Based Access Control: Lattice-based access control (LBAC) is a type of access control where access is granted based on a mathematical model known as a lattice. In an LBAC system, each user and resource is assigned a label, and access is granted based on the relationship between the labels.

Based on the above, it is clear that all of the answer choices listed are access control techniques used in the field of security administration. Therefore, the answer is none of the above (E) and the question may contain an error.