Choose the access control model that allows access control determinations to be performed based on the security labels associated with each user and each data item.

Choose the access control model that allows access control determinations to be performed
based on the security labels associated with each user and each data item.

Choose the access control model that allows access control determinations to be performed
based on the security labels associated with each user and each data item.

A.
LBACs (List Based Access Control) method

B.
MACs (Mandatory Access Control) method

C.
RBACs (Role Based Access Control) method

D.
DACs (Discretionary Access Control) method

Explanation:

Mandatory Access Control is a strict hierarchical model usually associated with governments. All
objects are given security labels known as sensitivity labels and are classified accordingly. Then
all users are given specific security clearances as to what they are allowed to access.
The MAC model is a static model that uses a predefined set of access privileges to files on the
system. The system administrator establishes these parameters and associates them with an
account, files or resources. The MAC model can be very restrictive.
Reference:
Mike Pastore and Emmett Dulaney , Security+ Study Guide , 2nd Edition, Alameda , Sybex , 2004,
p 11



Leave a Reply 0

Your email address will not be published. Required fields are marked *