New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GSLC Exam - Topic 3 Question 58 Discussion

Actual exam question for GIAC's GSLC exam
Question #: 58
Topic #: 3
[All GSLC Questions]

Which of the following options is an approach to restricting system access to authorized users?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Dona
3 months ago
I thought MIC was about integrity, not access control.
upvoted 0 times
...
Lauran
3 months ago
Totally agree, RBAC is the best choice here!
upvoted 0 times
...
Tamie
3 months ago
Wait, is MAC really that secure?
upvoted 0 times
...
Valentin
4 months ago
I think DAC is more flexible though.
upvoted 0 times
...
Ludivina
4 months ago
RBAC is definitely a way to restrict access.
upvoted 0 times
...
Nana
4 months ago
I’m leaning towards RBAC too, but I’m worried I might confuse it with DAC. They both seem similar in how they manage access.
upvoted 0 times
...
Alease
4 months ago
I feel like I’ve seen a question like this before, and I think MAC might be the right choice since it’s about mandatory access control.
upvoted 0 times
...
Bernardine
4 months ago
I remember studying DAC and MAC, but I can't recall which one is more about user permissions versus system controls.
upvoted 0 times
...
Isidra
5 months ago
I think RBAC is the one that focuses on restricting access based on roles, but I'm not entirely sure if it's the best answer here.
upvoted 0 times
...
Berry
5 months ago
Okay, I've got this. The question is asking about restricting access to authorized users, so the answer has to be one of the access control models. Based on what I recall, RBAC is the way to go - it allows you to manage permissions at the role level rather than for each individual user.
upvoted 0 times
...
Delsie
5 months ago
Hmm, access control models - I remember those from the security chapter. Let me see, I think RBAC is role-based access control, where permissions are assigned to roles rather than individual users. That sounds like the right approach for restricting system access.
upvoted 0 times
...
Lucy
5 months ago
This looks like a question on access control models. I think I remember learning about the different types like MAC, DAC, and RBAC. I'll need to think through the definitions of each one to determine the best approach.
upvoted 0 times
...
Dion
5 months ago
I'm a bit unsure about this one. There are a few different access control models listed, and I'm not totally confident I can distinguish between them. I'll need to review my notes on MAC, DAC, and RBAC to make sure I understand the differences and can identify the best approach for restricting access.
upvoted 0 times
...
Charlesetta
5 months ago
This question seems straightforward. I think the Apex sharing option is the best choice here since the scenario mentions franchises and real estate opportunities, which would require custom sharing logic.
upvoted 0 times
...
Shad
1 year ago
Who comes up with these exam questions anyway? Clearly, they've never worked in IT before.
upvoted 0 times
Matthew
1 year ago
A) MIC
upvoted 0 times
...
Ty
1 year ago
D) MAC
upvoted 0 times
...
Mable
1 year ago
C) RBAC
upvoted 0 times
...
...
Gussie
1 year ago
Hmm, I'm torn between RBAC and MAC. Guess I'll have to flip a coin on this one!
upvoted 0 times
...
Harley
1 year ago
I'm going with RBAC. It's the most flexible and scalable option for managing user permissions.
upvoted 0 times
...
Amber
1 year ago
MAC is the way to go. It provides a higher level of security by centralizing access control.
upvoted 0 times
Audrie
1 year ago
DAC can be useful for controlling access based on individual user permissions.
upvoted 0 times
...
Glenna
1 year ago
RBAC is also a good option for managing access control based on roles.
upvoted 0 times
...
Dawne
1 year ago
I agree, MAC is definitely a strong approach for restricting system access.
upvoted 0 times
...
...
Nathalie
1 year ago
DAC seems like a solid choice. I like the idea of users being able to control their own access rights.
upvoted 0 times
Kattie
1 year ago
MIC is a more granular approach to access control.
upvoted 0 times
...
Nan
1 year ago
MAC is another option for restricting access based on sensitivity levels.
upvoted 0 times
...
Velda
1 year ago
RBAC is also a popular choice for restricting system access.
upvoted 0 times
...
Mica
1 year ago
I agree, DAC is a good approach for user control.
upvoted 0 times
...
...
Kanisha
1 year ago
I'm not sure, but I think MAC could also be a valid option for restricting system access.
upvoted 0 times
...
Emilio
1 year ago
I think RBAC is the best approach to restrict system access. It allows for more granular control over user permissions.
upvoted 0 times
Ressie
1 year ago
MAC is another option that provides a high level of security for system access.
upvoted 0 times
...
Twana
1 year ago
I think DAC is also a good approach for restricting system access.
upvoted 0 times
...
Callie
1 year ago
I agree, RBAC is a great way to control access to the system.
upvoted 0 times
...
...
Myra
1 year ago
I agree with Ashton. RBAC is a common approach to restricting system access based on roles.
upvoted 0 times
...
Ashton
1 year ago
I think the answer is RBAC because it stands for Role-Based Access Control.
upvoted 0 times
...

Save Cancel