{"id":317,"date":"2021-01-17T05:22:48","date_gmt":"2021-01-16T17:52:10","guid":{"rendered":"https:\/\/exampracticetests.com\/ISC\/CISSP\/certified-information-systems-security-professional-cissp-question310\/"},"modified":"2021-01-17T05:24:06","modified_gmt":"2021-01-17T05:24:06","slug":"certified-information-systems-security-professional-cissp-question310","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/ISC\/CISSP\/certified-information-systems-security-professional-cissp-question310\/","title":{"rendered":"Certified Information Systems Security Professional &#8211; CISSP &#8211; Question310"},"content":{"rendered":"<div class=\"question\">Which of the following is the PRIMARY mechanism used to limit the range of objects available to a given subject within different execution domains? <br \/><strong><br \/>A.<\/strong> Process isolation <br \/><strong>B.<\/strong> Data hiding and abstraction <br \/><strong>C.<\/strong> Use of discrete layering and Application Programming Interfaces (API) <br \/><strong>D.<\/strong> Virtual Private Network (VPN)<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>C<\/strong><\/div>\n<p><strong>Explanation:<\/strong> <\/p>\n<div class=\"explanation\">\nReference: <a href=\"https:\/\/books.google.com.pk\/books?id=LnjxBwAAQBAJ&#038;pg=PT504&#038;lpg=PT504&#038;dq=CISSP+mechanism+used+to+limit+the+range+of+objects+available+to+a+given+subject+within+different+execution+domains&#038;source=bl&#038;ots=VLJY4mkZy&#038;sig=ACfU3U1adsKRObtT_l3tYTCLfHjS6gvLtg&#038;hl=en&#038;sa=X&#038;ved=2ahUKEwi_jIPw16npAhWsxoUKHVoSA4AQ6AEwAHoECBMQAQ#v=onepage&#038;q=CISSP%20mechanism%20used%20to%20limit%20the%20range%20of%20objects%20available%20to%20a%20given%20subject%20within%20different%20execution%20domains&#038;f=false\" title=\"External link\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/books.google.com.pk\/books?id=LnjxBwAAQBAJ&#038;pg=PT504&#038;lpg=PT50&#8230;<\/a><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Which of the following is the PRIMARY mechanism used to limit the range of objects available to a given subject within different execution domains? A. Process isolation B. Data hiding and abstraction C. Use of discrete layering and Application Programming Interfaces (API) D. Virtual Private Network (VPN) Show Answer Hide Answer Correct Answer: C Explanation: [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,391,313],"class_list":["post-317","post","type-post","status-publish","format-standard","hentry","category-certified-information-systems-security-professional-cissp","tag-certified-information-systems-security-professional-cissp","tag-choices","tag-question-310"],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/posts\/317","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/comments?post=317"}],"version-history":[{"count":1,"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/posts\/317\/revisions"}],"predecessor-version":[{"id":707,"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/posts\/317\/revisions\/707"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/media?parent=317"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/categories?post=317"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/tags?post=317"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}