ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 81 - ECSS discussion

Report
Export

Carol is a new employee at ApTech Sol Inc., and she has been allocated a laptop to fulfill his job activities. Carol tried to install certain applications on the company's laptop but could not complete the installation as she requires administrator privileges to initiate the installation process. The administrator imposed an access policy on the company's laptop that only users with administrator privileges have installation rights.

Identify the access control model demonstrated in the above scenario.

A.

Mandatory access control {MAC)

Answers
A.

Mandatory access control {MAC)

B.

Rule based access control (RB-RBAC)

Answers
B.

Rule based access control (RB-RBAC)

C.

Discretionary access control (DAC)

Answers
C.

Discretionary access control (DAC)

D.

Role based access control (RBAC)

Answers
D.

Role based access control (RBAC)

Suggested answer: D

Explanation:

The scenario described is an example ofRole Based Access Control (RBAC).In RBAC, access decisions are based on the roles that individual users have within an organization and the permissions that accompany those roles1.

In this case, Carol, as a new employee, has been assigned a user role that does not include administrator privileges. The access control policy in place requires administrator privileges for installing applications, which means that only users with an 'administrator' role have the rights to install software. This is a typical RBAC policy, where permissions to perform certain actions within the system are not assigned to individual users directly but are based on the roles assigned to them within the company.

The other options do not fit the scenario as well as RBAC:

A . Mandatory Access Control (MAC): In MAC, access rights are regulated by a central authority based on multiple levels of security. Users cannot change access permissions.

B . Rule Based Access Control (RB-RAC): This is similar to RBAC but is driven by rules that trigger under certain conditions, not explicitly mentioned in the scenario.

C . Discretionary Access Control (DAC): In DAC, the owner of the resource determines who is allowed to access it, which is not indicated in the scenario provided.

Therefore, the correct answer is D, Role Based Access Control (RBAC), as it aligns with the policy of assigning installation rights based on the user's role within the company.

asked 24/10/2024
Jeonghoon Park
29 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first