New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSAP Exam - Topic 6 Question 30 Discussion

Actual exam question for ISC2's ISSAP exam
Question #: 30
Topic #: 6
[All ISSAP Questions]

You work as an administrator for Techraft Inc. Employees of your company create 'products', which are supposed to be given different levels of access.

You need to configure a security policy in such a way that an employee (producer of the product) grants accessing privileges (such as read,

write, or alter) for his product.

Which of the following access control models will you use to accomplish this task?

Show Suggested Answer Hide Answer
Suggested Answer: A

object and what privileges they have.

Two important concepts in DAC are as follows:

File and data ownership: Every object in the system has an owner. In most DAC systems, each object's initial owner is the subject that

caused it to be created. The access policy for an object is determined by its owner.

Access rights and permissions: These are the controls that an owner can assign to other subjects for specific resources.

Access controls may be discretionary in ACL-based or capability-based access control systems.

Note: In capability-based systems, there is no explicit concept of owner, but the creator of an object has a similar degree of control over its

access policy.

Answer option C is incorrect. Mandatory Access Control (MAC) is a model that uses a predefined set of access privileges for an object of the

system. Access to an object is restricted on the basis of the sensitivity of the object and granted through authorization. Sensitivity of an

object is defined by the label assigned to it. For example, if a user receives a copy of an object that is marked as 'secret', he cannot grant

permission to other users to see this object unless they have the appropriate permission.

Answer option D is incorrect. An access control list (ACL) is an ordered list of access control entries (ACEs). Each ACE identifies a trustee and

specifies a set of access rights allowed, denied, or audited for that trustee. A security descriptor of an object contains two ACL types. They are

as follows:

Discretionary Access Control List (DACL): It identifies a specified trustee that is allowed or denied access to a securable object.

System Access Control List (SACL): It enables an administrator to log attempts for accessing a secured object.

Answer option B is incorrect. Role-based access control (RBAC) is an access control model. In this model, a user can access resources

according to his role in the organization. For example, a backup administrator is responsible for taking backups of important data. Therefore,

he is only authorized to access this data for backing it up. However, sometimes users with different roles need to access the same resources.

This situation can also be handled using the RBAC model.


Contribute your Thoughts:

0/2000 characters
Laura
4 months ago
MAC? Nah, that’s too restrictive for this scenario.
upvoted 0 times
...
Leana
4 months ago
ACL could work too, but DAC seems more fitting.
upvoted 0 times
...
Britt
4 months ago
Wait, can DAC really handle all those levels of access?
upvoted 0 times
...
Alisha
4 months ago
I agree, DAC is the way to go here!
upvoted 0 times
...
Jade
5 months ago
Definitely DAC, it lets producers control access.
upvoted 0 times
...
Nettie
5 months ago
Access Control Lists (ACL) could be relevant, but I think they are more about specifying permissions rather than letting users grant access themselves.
upvoted 0 times
...
Gracie
5 months ago
I feel like Mandatory Access Control (MAC) is too rigid for this scenario. It doesn't seem like the right fit for employee-driven access.
upvoted 0 times
...
Nancey
5 months ago
I think this might be about Discretionary Access Control (DAC) since it allows users to manage their own access rights.
upvoted 0 times
...
Karrie
5 months ago
I'm not entirely sure, but I remember something about Role-Based Access Control (RBAC) being more structured. Could that apply here?
upvoted 0 times
...
Cristy
5 months ago
Hmm, this is a tricky one. I think the Xbar-R charts might be the best option since they can handle outliers and subgroups.
upvoted 0 times
...
Joaquin
5 months ago
I think the answer is 3 charts, but I'm not 100% confident. I'll make a note to double-check that in the documentation.
upvoted 0 times
...

Save Cancel