ISC2 Certified in Cybersecurity (CC) Practice Question

In a role-based access control (RBAC) model, how are access permissions typically assigned to users?

  • Access is allowed only when a user's clearance level equals or exceeds the data classification.

  • Each user is granted rights individually without reference to any group or role.

  • Real-time rules evaluate multiple attributes of the user, resource, and environment before granting access.

  • Users inherit the required rights by being placed into predefined job or functional roles.

ISC2 Certified in Cybersecurity (CC)
Access Control Concepts
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot