(ISC)2(ISC)2
CISSP · Question #260
CISSP Question #260: Real Exam Question with Answer & Explanation
Sign in or unlock CISSP to reveal the answer and full explanation for question #260. The question stem and answer options stay visible for context.
Submitted by manish99· Mar 5, 2026Identity and Access Management
Question
A user sends an e-mail request asking for read-only access to files that are not considered sensitive. A Discretionary Access Control (DAC) methodology is in place. Which is the MOST suitable approach that the administrator should take?
Options
- AAdministrator should request data owner approval to the user access
- BAdministrator should request manager approval for the user access
- CAdministrator should directly grant the access to the non-sensitive files
- DAdministrator should assess the user access need and either grant or deny the access
Unlock CISSP to see the answer
You've previewed enough free CISSP questions. Unlock CISSP for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.
Topics
#Discretionary Access Control (DAC)#data owner#access request#access control models