nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #231

CERTIFIED-IN-CYBERSECURITY Question #231: Real Exam Question with Answer & Explanation

The correct answer is B: Labels are assigned to objects and subjects. In a MAC (Mandatory Access Control) model, labels are assigned both to objects and to subjects based on their classification level (see ISC2 Study Guide, Module 3, under Mandatory Access Control). These labels are typically assigned as Confidential, Secret, and Top Secret, and de

Access Controls Concepts

Question

What receives a label in a MAC model?

Options

  • AAll objects and subjects are assigned a label.
  • BLabels are assigned to objects and subjects
  • CEach object has a label, and each subject has a compartment.
  • DEach subject has a label, and each object has a compartment.

Explanation

In a MAC (Mandatory Access Control) model, labels are assigned both to objects and to subjects based on their classification level (see ISC2 Study Guide, Module 3, under Mandatory Access Control). These labels are typically assigned as Confidential, Secret, and Top Secret, and determine the access rights each subject has to each object. Labels are not assigned to compartments or objects, and all objects and subjects do not receive the same label. Furthermore, labels are not assigned to objects and subjects in any other type of access control model, such as DAC (Discretionary Access Control) or RBAC (Role- Based Access Control). In these models, access rights are assigned to subjects based on their roles, and access rights are assigned to objects based on the subject's identity.

Topics

#Mandatory Access Control#Access Control Models#Security Labels#Subjects and Objects

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions