CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 5 ■ dentity and Access Management (Domain 5)I 107



  1. What type of access controls allow the owner of a file to grant other users access to it
    using an access control list?
    A. Role based
    B. Nondiscretionary
    C. Rule based
    D. Discretionary

  2. Alex’s job requires him to see protected health information (PHI) to ensure proper treat-
    ment of patients. His access to their medical records does not provide access to patient
    addresses or billing information. What access control concept best describes this control?
    A. Separation of duties
    B. Constrained interfaces
    C. Context-dependent control
    D. Need to know


Use your knowledge of the Kerberos logon process and the following diagram to answer
questions 17–19.

Client Workstation

A

B

C

Client Workstation

Client Workstation

KDC

KDC

Username and
Password

Services


  1. At point A in the diagram, the client sends the username and password to the KDC. How
    is the username and password protected?
    A. 3DES encryption
    B. TLS encryption
    C. SSL encryption
    D. AES encryption

Free download pdf