PrepAway - Latest Free Exam Questions & Answers

Which of the following is an access control model that allows users to access any of the resources according t

Which of the following is an access control model that allows users to access any of the resources according to his role in an organization?

PrepAway - Latest Free Exam Questions & Answers

A.
LDP

B.
RBAC

C.
CBAC

D.
LDAP

Explanation:
Role-based access control (RBAC) is an access control model. In this model, a user can access resources according to his role in the organization. For example, a backup administrator is responsible for taking backups of important datA.Therefore, he is only authorized to access this data for backing it up. However, sometimes users with different roles need to access the same resources. This situation can also be handled using the RBAC model.

Answer D is incorrect. The Lightweight Directory Access Protocol (LDAP) is a standard protocol, which provides access to the directory. It also provides a common language for LDAP clients and servers to communicate with each other. The LDAP is commonly used as standard in the industry. By using a directory service such as LDAP, information existing in multiple systems and formats can be brought at one place.

Answer A is incorrect. LDP is a graphical tool that allows users to perform LDAP operations, such as bind, search, modify, add, and delete, against any LDAP-compatible directory service, such as Active Directory. It has a navigational view with a scope pane on the left. The scope pane is used for searching Active Directory. It contains a details pane on the right. This pane is used for displaying the results of the LDAP operations. LDP is valuable in that it allows you to see every object property in the directory service. Administrators can also use LDP to perform extended LDAP operations.

Answer C is incorrect. Context-based access control (CBAC) is the basic function of a stateful inspection firewall which filters the TCP and UDP packets using application layer protocol session information. CBAC can be configured to inspect specified TCP and UDP traffic through a firewall only when the connection is initiated from within the network needing protection. CBAC examines not only network layer and transport layer information but also examines the applicationlayer protocol information to learn about the state of the TCP or UDP session. This allows support of protocols that involve multiple channels created as a result of negotiations in the FTP control channel. CBAC inspects traffic that travels through the firewall to discover and manage state information for TCP and UDP sessions. This state information is used to create temporary openings in the firewall’s access lists to allow return traffic and additional data connections for ermissible sessions.

Reference: http.//csrc.nist.gov/groups/SNS/rbac/documents/design_implementation/Intro_role_based_access.htm

One Comment on “Which of the following is an access control model that allows users to access any of the resources according t


Leave a Reply