Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam ISSMP Topic 2 Question 9 Discussion

Actual exam question for ISC2's Information Systems Security Management Professional exam
Question #: 9
Topic #: 2
[All Information Systems Security Management Professional Questions]

Which of the following divisions of the Trusted Computer System Evaluation Criteria (TCSEC) is based on the Mandatory Access Control (MAC) policy?

Show Suggested Answer Hide Answer
Suggested Answer: C

Division B of the Trusted Computer System Evaluation Criteria (TCSEC) is based on the Mandatory Access Control (MAC) policy. Mandatory Access Control (MAC) is a model that uses a predefined set of access privileges for an object of the system. Access to an object is restricted on the basis of the sensitivity of the object and granted through authorization. Sensitivity of an object is defined by the label assigned to it. For example, if a user receives a copy of an object that is marked as 'secret', he cannot grant permission to other users to see this object unless they have the appropriate permission.


Contribute your Thoughts:

Currently there are no comments in this discussion, be the first to comment!


Save Cancel