New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

BCS CISMP-V9 Exam - Topic 1 Question 63 Discussion

Actual exam question for BCS's CISMP-V9 exam
Question #: 63
Topic #: 1
[All CISMP-V9 Questions]

A system administrator has created the following "array" as an access control for an organisation.

Developers: create files, update files.

Reviewers: upload files, update files.

Administrators: upload files, delete fifes, update files.

What type of access-control has just been created?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Gearldine
3 months ago
I thought mandatory access control was more common.
upvoted 0 times
...
Cecilia
3 months ago
No way, it's clearly role based.
upvoted 0 times
...
Audry
3 months ago
Wait, are we sure it's not task based?
upvoted 0 times
...
Latia
4 months ago
Agreed, it matches the roles perfectly!
upvoted 0 times
...
Jonelle
4 months ago
Definitely role based access control.
upvoted 0 times
...
Julianna
4 months ago
I keep mixing up rule-based and role-based access control; I hope I remember the differences correctly during the exam!
upvoted 0 times
...
Jestine
4 months ago
This seems similar to a practice question we did on access controls, and I think it aligns with role-based access control.
upvoted 0 times
...
Bulah
4 months ago
I'm not entirely sure, but I remember something about task-based access control being more about specific tasks rather than roles.
upvoted 0 times
...
Ivette
5 months ago
I think this might be role-based access control since the permissions are assigned based on user roles like developers and administrators.
upvoted 0 times
...
Blondell
5 months ago
This looks straightforward to me. The different user types and their specific permissions align with a role-based access control system. I'm going to go with option B as the answer.
upvoted 0 times
...
Maryanne
5 months ago
I'm a bit confused by the wording of the question. Is this really a role-based system, or is it something more specific like task-based access control? I'll need to re-read the details carefully before answering.
upvoted 0 times
...
Sheldon
5 months ago
Okay, I've got this. The different user types and their associated permissions clearly indicate a role-based access control system. I'm confident that the answer is B, role-based access control.
upvoted 0 times
...
Golda
5 months ago
Hmm, I'm a bit unsure about this one. The question mentions an "array" of access control, which doesn't sound like a typical RBAC setup. I'll need to think this through carefully.
upvoted 0 times
...
Beth
5 months ago
This looks like a classic role-based access control (RBAC) scenario. The different user types (Developers, Reviewers, Administrators) have specific permissions associated with their roles.
upvoted 0 times
...
Casie
5 months ago
Creating a change request to evaluate the impact sounds like the prudent move here. Revising the project plan is also an option, but I'd want to understand the full implications first.
upvoted 0 times
...
Felix
5 months ago
I'm a bit confused by the options. Can someone explain the differences between hypervisor virtualization, hardware virtualization, and para-virtualized hardware drivers? I want to make sure I have a good understanding before answering.
upvoted 0 times
...
Jesus
5 months ago
I'm a bit confused on this one. Do I need to allow ARP traffic as well as HTTP? Or is a contract with no filter the right approach?
upvoted 0 times
...
Eden
10 months ago
I'm going with Role Based Access Control. Although, if I was an Administrator, I'd probably just delete all the files and start fresh. Simplify things, you know?
upvoted 0 times
Mari
8 months ago
Yeah, starting fresh might be a bit drastic. It's important to have the right access control in place to prevent such actions.
upvoted 0 times
...
Shalon
8 months ago
I agree, it's easier to manage access that way. But deleting all the files as an Administrator seems a bit extreme.
upvoted 0 times
...
Yen
9 months ago
I think it's Role Based Access Control too. It makes sense to assign permissions based on roles.
upvoted 0 times
...
...
Paulina
10 months ago
Wow, this is a classic case of Role Based Access Control. I wonder if the Administrators can also 'undelete' files. That would be a neat trick!
upvoted 0 times
...
Melodie
10 months ago
Ha! This is easy, it's Role Based Access Control. I can already see the Administrators role and their superpowers to delete files. Easy peasy!
upvoted 0 times
Daron
9 months ago
No, it's actually Role based access control. The roles determine the access permissions.
upvoted 0 times
...
Marisha
9 months ago
I think it's Task based access control.
upvoted 0 times
...
Cordie
9 months ago
Yes, you're right! It's Role Based Access Control.
upvoted 0 times
...
...
Jerry
10 months ago
Hmm, I was thinking it could be Rule Based Access Control since the permissions seem to be based on specific rules. But Role Based makes more sense here.
upvoted 0 times
...
Michal
10 months ago
I believe it's Role based access control too, as each role has specific tasks they can perform.
upvoted 0 times
...
Apolonia
11 months ago
I think it's definitely Role Based Access Control. The permissions are grouped by roles like Developers, Reviewers, and Administrators.
upvoted 0 times
Roxane
9 months ago
Definitely Role Based Access Control, it aligns with how permissions are assigned to different roles.
upvoted 0 times
...
Kati
9 months ago
I think you're right, Role Based Access Control is the most suitable option for this scenario.
upvoted 0 times
...
Yuette
9 months ago
Yes, Role Based Access Control makes sense here. Each role has specific permissions.
upvoted 0 times
...
Kerry
10 months ago
I agree, it seems like Role Based Access Control since permissions are assigned based on roles.
upvoted 0 times
...
Phyliss
10 months ago
Yes, it's definitely Role Based Access Control. Each role has specific permissions assigned to it.
upvoted 0 times
...
Phyliss
10 months ago
I agree, it seems like Role Based Access Control since permissions are assigned based on roles.
upvoted 0 times
...
...
Adelina
11 months ago
I agree with Deangelo, because different roles have different permissions.
upvoted 0 times
...
Deangelo
11 months ago
I think the access control created is Role based access control.
upvoted 0 times
...

Save Cancel