New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSMP Exam - Topic 2 Question 9 Discussion

Actual exam question for ISC2's ISSMP exam
Question #: 9
Topic #: 2
[All ISSMP Questions]

Which of the following divisions of the Trusted Computer System Evaluation Criteria (TCSEC) is based on the Mandatory Access Control (MAC) policy?

Show Suggested Answer Hide Answer
Suggested Answer: C

Division B of the Trusted Computer System Evaluation Criteria (TCSEC) is based on the Mandatory Access Control (MAC) policy. Mandatory Access Control (MAC) is a model that uses a predefined set of access privileges for an object of the system. Access to an object is restricted on the basis of the sensitivity of the object and granted through authorization. Sensitivity of an object is defined by the label assigned to it. For example, if a user receives a copy of an object that is marked as 'secret', he cannot grant permission to other users to see this object unless they have the appropriate permission.


Contribute your Thoughts:

0/2000 characters
Lindy
4 months ago
Really? I didn't know MAC was tied to Division B.
upvoted 0 times
...
Rosendo
4 months ago
Yup, Division B is all about Mandatory Access Control.
upvoted 0 times
...
Maryln
4 months ago
Wait, are you sure? I thought it was Division A.
upvoted 0 times
...
Carin
4 months ago
Totally agree, Division B is the right one!
upvoted 0 times
...
Ernestine
5 months ago
It's Division B, based on MAC.
upvoted 0 times
...
Catarina
5 months ago
I practiced a similar question, and I believe Division B is correct for MAC policies.
upvoted 0 times
...
Elza
5 months ago
Division C seems to focus more on discretionary access controls, so I don't think that's it.
upvoted 0 times
...
Lindsey
5 months ago
I remember studying that Division A is about the highest security levels, but I can't recall if it specifically mentions MAC.
upvoted 0 times
...
Onita
5 months ago
I think Division B is the one related to Mandatory Access Control, but I'm not entirely sure.
upvoted 0 times
...
Nelida
5 months ago
I think I know the answer, but I want to double-check my understanding. The question is asking about the types of data the developer should import, not the specific instances. So I'll need to carefully evaluate each option to determine the two best choices.
upvoted 0 times
...
Malcom
5 months ago
This question seems a bit tricky. I'll need to carefully read through the options and think about the process of discovery after an Entry Point is configured.
upvoted 0 times
...
Tandra
5 months ago
I'm a bit confused by this question. Doesn't an internal load balancer require the backend VMs to be in the same virtual network? I'll need to double-check the requirements.
upvoted 0 times
...
Billi
5 months ago
Hmm, I'm not entirely sure about this one. I know we covered process monitoring in class, but I'm having trouble remembering the specific tool names. Let me think this through carefully.
upvoted 0 times
...

Save Cancel