New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCFA Exam - Topic 1 Question 41 Discussion

Actual exam question for GIAC's GCFA exam
Question #: 41
Topic #: 1
[All GCFA Questions]

In which of the following access control models can a user not grant permissions to other users to see

a copy of an object marked as secret that he has received, unless they have the appropriate

permissions?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Natalya
3 months ago
RBAC is about roles, not individual permissions.
upvoted 0 times
...
Bettina
3 months ago
Wait, are you sure about MAC? Seems a bit strict!
upvoted 0 times
...
Evette
3 months ago
ACL allows sharing, so it's not that one.
upvoted 0 times
...
Inocencia
4 months ago
I thought it was DAC at first, but MAC makes sense.
upvoted 0 times
...
Jenifer
4 months ago
Definitely MAC! Users can't share permissions.
upvoted 0 times
...
Trinidad
4 months ago
I’m confused about RBAC too; it seems like users can share permissions based on roles, so it can't be D, right?
upvoted 0 times
...
Martina
4 months ago
I practiced a similar question, and I think MAC is the right choice since it enforces strict policies on access.
upvoted 0 times
...
Viola
4 months ago
I'm not entirely sure, but I remember something about DAC allowing users to grant permissions. So maybe it's not A?
upvoted 0 times
...
Ivette
5 months ago
I think the answer might be C, Mandatory Access Control, because it restricts users from sharing permissions.
upvoted 0 times
...
Mattie
5 months ago
I'm pretty confident the answer is Mandatory Access Control (MAC). The question specifically says the user can't grant permissions, which is a core characteristic of MAC.
upvoted 0 times
...
Terrilyn
5 months ago
I'm leaning towards Mandatory Access Control (MAC) as the answer. In MAC, the system has strict rules about who can access what, and users can't just share access willy-nilly.
upvoted 0 times
...
Misty
5 months ago
Okay, let me think this through. The key is that the user can't grant permissions to others to see a secret object, unless they have the appropriate permissions. That sounds like Role Based Access Control (RBAC) to me.
upvoted 0 times
...
Ressie
5 months ago
I'm pretty sure this is a Mandatory Access Control (MAC) question. In MAC, the system administrator controls access permissions, not the individual users.
upvoted 0 times
...
Virgina
5 months ago
Hmm, I'm a bit confused. I think it might be Discretionary Access Control (DAC), since that's where the user has control over permissions. But I'm not 100% sure.
upvoted 0 times
...
Lashandra
5 months ago
This is a tricky one, but I think the key is to focus on the fact that the security analyst wants to track the real source IP from the workstations. Given the source NAT happening with the web filtering solution, the best option would be to use the X-Forwarded-For header to pass along that original client IP. I'm confident that B is the correct answer.
upvoted 0 times
...
Alpha
5 months ago
Hmm, this is a tricky one. I'm not too familiar with the tibemsd.conf file, so I'll need to think through the options carefully. My initial guess would be that it sets the affinity for the main tibemsd process, but I'm not 100% sure.
upvoted 0 times
...
Jose
5 months ago
I have a feeling it's one of the higher options, maybe 125, but I'm not sure if that's too high for what they specified.
upvoted 0 times
...
Lacey
10 months ago
I'm so hungry, I could eat a secret object right now. But first, let me think about this question... Ah, I got it! The answer is C) Mandatory Access Control (MAC). It's the only one that really keeps those secret objects under lock and key.
upvoted 0 times
...
Shaunna
10 months ago
I'm feeling lucky today, so I'm going to go with A) Discretionary Access Control (DAC). After all, who doesn't love a little bit of discretion when it comes to their secret objects?
upvoted 0 times
Charolette
8 months ago
User 3: I'm feeling lucky too, I'll go with A) Discretionary Access Control (DAC) like the user who commented.
upvoted 0 times
...
Leota
8 months ago
User 2: I'm not so sure about that. I believe it's D) Role Based Access Control (RBAC).
upvoted 0 times
...
Iesha
9 months ago
User 1: I think the correct answer is C) Mandatory Access Control (MAC).
upvoted 0 times
...
...
Luz
10 months ago
Hmm, this is a tough one. I'm gonna have to go with D) Role Based Access Control (RBAC) because that's where the permissions are based on the user's role, not their individual discretion.
upvoted 0 times
Janey
9 months ago
User 3: I agree with Janey, RBAC seems like the best option for this scenario.
upvoted 0 times
...
Kaycee
9 months ago
User 2: I see your point, but I still believe it's D) Role Based Access Control (RBAC) because it focuses on roles rather than individual permissions.
upvoted 0 times
...
Elke
9 months ago
User 1: I think it's C) Mandatory Access Control (MAC) because it enforces restrictions based on security labels.
upvoted 0 times
...
...
Azzie
10 months ago
This seems like a trick question. I'm going to go with B) Access Control List (ACL) because that's where the system administrator has the most control over permissions.
upvoted 0 times
Gretchen
8 months ago
User4: I'm not sure, but I'll go with A) Discretionary Access Control (DAC) just to cover all bases.
upvoted 0 times
...
Brock
8 months ago
User3: I see your point, but I still think it's B) Access Control List (ACL) because the system administrator controls permissions.
upvoted 0 times
...
Chandra
8 months ago
User2: I disagree, I believe it's D) Role Based Access Control (RBAC) because permissions are based on roles.
upvoted 0 times
...
Janessa
9 months ago
User 3: I'm not sure, but I think D) Role Based Access Control (RBAC) also limits users from granting permissions to others.
upvoted 0 times
...
Sophia
9 months ago
User 2: I agree with you, Sophia. MAC is all about strict control over permissions.
upvoted 0 times
...
Detra
9 months ago
User 1: I think it's C) Mandatory Access Control (MAC) because it restricts users from granting permissions to see secret objects.
upvoted 0 times
...
Rasheeda
9 months ago
User1: I think it's C) Mandatory Access Control (MAC) because it restricts users from granting permissions to others.
upvoted 0 times
...
...
Lai
10 months ago
I think the answer is C) Mandatory Access Control (MAC). In MAC, the system administrator has complete control over the permissions, and users can't grant access to others unless they have the appropriate permissions.
upvoted 0 times
...
Annette
10 months ago
I'm not sure about this one. Can someone explain why DAC, ACL, and RBAC are not the correct answers for this question?
upvoted 0 times
...
Leonida
10 months ago
I agree with Cecil. In MAC, access control is determined by the system, not the user. So, other users cannot be granted permissions for secret objects.
upvoted 0 times
...
Cecil
11 months ago
I think the answer is C) Mandatory Access Control (MAC). In MAC, users cannot grant permissions to others for secret objects.
upvoted 0 times
...

Save Cancel