(ISC)2 Certified in Cybersecurity Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the (ISC)2 Certified in Cybersecurity Exam with comprehensive quizzes and extensive question banks. Enhance your skills with detailed explanations and practice tests designed to improve your expertise for the certification exam. Get exam-ready now!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which type of access control lists typically include explicit permissions for users?

  1. Discretionary Access Control

  2. Role-Based Access Control

  3. Network Access Control

  4. Mandatory Access Control

The correct answer is: Discretionary Access Control

Discretionary Access Control (DAC) is the correct answer because it allows the owner of a resource, such as a file or directory, to determine who has access to that resource and what kind of access they have. In DAC systems, permissions are explicitly assigned by the resource owner to users or groups, meaning that the owner can grant or revoke access rights at their discretion. This model is flexible and user-friendly, as it enables users to control access based on their specific needs and the trust they have in other users. In contrast, Role-Based Access Control (RBAC) organizes access permissions based on roles assigned to users, rather than explicitly defined permissions for each individual user. This could mean that multiple users may share the same access level based on their roles, which doesn't involve the same degree of individual discretion as DAC. Network Access Control (NAC) focuses primarily on policies for network access and security controls, including measures taken to regulate who can access a network and how. While it deals with permissions, it does so within the context of network security rather than file or resource ownership. Mandatory Access Control (MAC) is a stricter approach where access rights are regulated by a central authority based on multiple levels of security. Users cannot alter permissions; they