Fortify Your Cyber Fortress: Conquer the 2026 NDE Practice Exam! 🚀🔐

Question: 1 / 545

What access control model restricts permissions beyond the user’s control?

Discretionary access control (DAC)

Role-Based access control (RBAC)

Access Control Lists (ACL)

Mandatory access control (MAC)

The correct choice is the model that embodies restrictions placed on permissions which are not within the user's ability to modify or control: Mandatory Access Control (MAC). This model enforces strict policies dictated by a central authority, meaning users are assigned access rights based on information clearance levels or specific data sensitivity classifications. In MAC, the decisions regarding access are made according to predetermined settings based on each user's level of clearance or the classification of the information.

This is in contrast to other models like Discretionary Access Control (DAC) and Role-Based Access Control (RBAC). In DAC, users have the authority to control access to their own resources and can make decisions that can result in less restrictive access. RBAC assigns permissions based on the roles a user has within an organization, but users can often perceive and manage permissions within those roles, still positioning them with some level of discretion over access rights.

Access Control Lists (ACL) provide a list detailing which users or system processes are granted access to objects, and what operations are allowed on given objects. While ACLs also establish control over permissions, they can be modified by users, thereby maintaining some level of discretionary capability. Therefore, Mandatory Access Control (MAC) stands out as the model where permissions are governed in a manner

Get further explanation with Examzify DeepDiveBeta
Next Question

Report this question

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy