Access Control Techniques: Identifying the Exclusion | SSCP Exam Answer

Access Control Techniques

Prev Question Next Question

Question

Access Control techniques do not include which of the following?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

D.

Access Control Techniques - Discretionary Access Control - Mandatory Access Control - Lattice Based Access Control - Rule-Based Access Control - Role-Based Access Control - Source: DUPUIS, Clement, Access Control Systems and Methodology, Version 1, May 2002, CISSP Open Study Group Study Guide for Domain 1, Page 13.

Access Control is a security technique that allows or restricts access to resources based on certain rules or policies. There are several types of Access Control techniques available to control access to resources.

A. Rule-Based Access Controls: Rule-based Access Controls are based on predefined rules or policies. Access to a resource is granted or denied based on whether the requestor satisfies the rules or policies. For example, an organization may have a rule that only employees with a certain job title can access certain resources.

B. Role-Based Access Control: Role-based Access Control (RBAC) is a method of Access Control in which access decisions are based on the roles or job functions of the requestor. RBAC provides a way to control access to resources based on the job responsibilities of an individual within an organization. For example, a bank may have a role called "Teller" that is responsible for handling customer transactions, and only individuals in that role will have access to the systems and data required for that function.

C. Mandatory Access Control: Mandatory Access Control (MAC) is a security mechanism used in computer systems to control access to resources based on the sensitivity of the information being protected. In MAC, access to resources is controlled by the system rather than the user. For example, a government agency may have a top-secret classification level, and only individuals with the appropriate clearance level can access the data.

D. Random Number Based Access Control: Random Number Based Access Control is not a valid Access Control technique. It is not used to control access to resources in any way.

In conclusion, the correct answer is D. Random Number Based Access Control. The other options, A, B, and C, are all valid Access Control techniques.