Certified Information Systems Security Professional – CISSP – Question123

An organization’s security policy delegates to the data owner the ability to assign which user roles have access to a particular resource. What type of authorization mechanism is being used?

A.
Discretionary Access Control (DAC)
B. Role Based Access Control (RBAC)
C. Media Access Control (MAC)
D. Mandatory Access Control (MAC)

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question122

Which of the following is a common feature of an Identity as a Service (IDaaS) solution?

A.
Single Sign-On (SSO) authentication support
B. Privileged user authentication support
C. Password reset service support
D. Terminal Access Controller Access Control System (TACACS) authentication support

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question121

Which of the following MUST be scalable to address security concerns raised by the integration of third-party identity services?

A.
Mandatory Access Controls (MAC)
B. Enterprise security architecture
C. Enterprise security procedures
D. Role Based Access Controls (RBAC)

Correct Answer: D

Certified Information Systems Security Professional – CISSP – Question119

In an organization where Network Access Control (NAC) has been deployed, a device trying to connect to the network is being placed into an isolated domain. What could be done on this device in order to obtain proper connectivity?

A.
Connect the device to another network jack
B. Apply remediation’s according to security requirements
C. Apply Operating System (OS) patches
D. Change the Message Authentication Code (MAC) address of the network interface

Correct Answer: B

Certified Information Systems Security Professional – CISSP – Question118

Which of the following is the BEST metric to obtain when gaining support for an Identify and Access Management (IAM) solution?

A.
Application connection successes resulting in data leakage
B. Administrative costs for restoring systems after connection failure
C. Employee system timeouts from implementing wrong limits
D. Help desk costs required to support password reset requests

Correct Answer: D

Certified Information Systems Security Professional – CISSP – Question117

The core component of Role Based Access Control (RBAC) must be constructed of defined data elements. Which elements are required?

A.
Users, permissions, operations, and protected objects
B. Roles, accounts, permissions, and protected objects
C. Users, roles, operations, and protected objects
D. Roles, operations, accounts, and protected objects

Correct Answer: C

Certified Information Systems Security Professional – CISSP – Question115

Users require access rights that allow them to view the average salary of groups of employees. Which control would prevent the users from obtaining an individual employee’s salary?

A.
Limit access to predefined queries
B. Segregate the database into a small number of partitions each with a separate security level
C. Implement Role Based Access Control (RBAC)
D. Reduce the number of people who have access to the system for statistical purposes

Correct Answer: C