Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam CSSLP Topic 2 Question 84 Discussion

Actual exam question for ISC2's CSSLP exam
Question #: 84
Topic #: 2
[All CSSLP Questions]

Which of the following access control models uses a predefined set of access privileges for an object of a system?

Show Suggested Answer Hide Answer
Suggested Answer: B

The Chinese Wall Model is the basic security model developed by Brewer and Nash. This model prevents information flow that may cause a

conflict of interest in an organization representing competing clients. The Chinese Wall Model provides both privacy and integrity for data.

Answer D is incorrect. The Biba model is a formal state transition system of computer security policy that describes a set of access

control rules designed to ensure data integrity. Data and subjects are grouped into ordered levels of integrity. The model is designed so that

subjects may not corrupt data in a level ranked higher than the subject, or be corrupted by data from a lower level than the subject.

Answer C is incorrect. The Clark-Wilson model provides a foundation for specifying and analyzing an integrity policy for a computing

system. The model is primarily concerned with formalizing the notion of information integrity. Information integrity is maintained by preventing

corruption of data items in a system due to either error or malicious intent.

The model's enforcement and certification rules define data items and processes that provide the basis for an integrity policy. The core of the

model is based on the notion of a transaction.

Answer A is incorrect. The Bell-La Padula Model is a state machine model used for enforcing access control in government and military

applications. The model is a formal state transition model of computer security policy that describes a set of access control rules which use

security labels on objects and clearances for subjects. Security labels range from the most sensitive (e.g.,'Top Secret'), down to the least

sensitive (e.g., 'Unclassified' or 'Public').

The Bell-La Padula model focuses on data confidentiality and controlled access to classified information, in contrast to the Biba Integrity Model

which describes rules for the protection of data integrity.


Contribute your Thoughts:

Reena
2 days ago
Wait, there's a difference between Role-Based and Mandatory Access Control? *scratches head* I'm just going to pick whatever option has the most words in it. Sounds legit.
upvoted 0 times
...
Kimberely
12 days ago
Jokes on you, the answer is obviously C - Policy Access Control. I mean, who even uses Discretionary Access Control these days? That's so 90s.
upvoted 0 times
...
Nan
13 days ago
I'm torn between B and D, but I think Mandatory Access Control (Option D) is the way to go here. Can't go wrong with that good ol' government-style security, right?
upvoted 0 times
...
Beatriz
13 days ago
That makes sense, I see your point. Thanks for clarifying!
upvoted 0 times
...
Genevieve
15 days ago
I disagree, I believe it's D) Mandatory Access Control because it enforces access control based on security labels.
upvoted 0 times
...
Mitzie
16 days ago
Hmm, this seems like a classic access control question. I'm going to go with Option A - Role-Based Access Control. It just makes the most sense in terms of predefined privileges for objects.
upvoted 0 times
...
Beatriz
22 days ago
I think the answer is A) Role-Based Access Control.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77