New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 312-38 Exam - Topic 4 Question 29 Discussion

Actual exam question for Eccouncil's 312-38 exam
Question #: 29
Topic #: 4
[All 312-38 Questions]

Ross manages 30 employees and only 25 computers in the organization. The network the company uses is a peer-to-peer. Ross configures access control measures allowing the employees to set their own control measures for their files and folders. Which access control did Ross implement?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Alba
4 months ago
I thought mandatory access control was the way to go here.
upvoted 0 times
...
Herman
4 months ago
Yup, sounds like Ross is letting employees manage their own access.
upvoted 0 times
...
Alyce
4 months ago
Wait, are we sure about that? Sounds a bit off.
upvoted 0 times
...
Adell
4 months ago
I agree, it fits the description perfectly.
upvoted 0 times
...
Valda
5 months ago
Definitely Discretionary access control!
upvoted 0 times
...
Santos
5 months ago
I’m a bit confused. Could it also be non-discretionary access control? I remember that term but not sure how it applies in this case.
upvoted 0 times
...
Clement
5 months ago
I feel like this question is similar to one we did in class about peer-to-peer networks. I think discretionary access control fits best here.
upvoted 0 times
...
Nadine
5 months ago
I'm not entirely sure, but I remember something about mandatory access control being more rigid. This seems like the opposite.
upvoted 0 times
...
Chaya
5 months ago
I think this might be discretionary access control since employees can set their own measures. It sounds familiar from our practice questions.
upvoted 0 times
...
Sharmaine
5 months ago
I'm confident that App-ID (option D) is the right answer here. The question is specifically asking about the customer's lack of visibility into the Layer 7 application traffic, and App-ID is designed to provide that level of application-level inspection and identification.
upvoted 0 times
...
Tequila
5 months ago
Ah, I see what they're getting at. The key is that users can reinstall the client later, so the answer must be True.
upvoted 0 times
...
Albina
5 months ago
This question seems straightforward. I'll focus on weak coupling, strong cohesion, and open for extension - those are key principles for component-based architecture.
upvoted 0 times
...

Save Cancel