ISC2 Certified in Cybersecurity (CC) Practice Question

In an organization using role-based access control (RBAC), how are permissions typically assigned in contrast to discretionary access control (DAC)?

  • Users choose whichever permissions they need each time they authenticate to the system.

  • Permissions are granted individually to each user at the discretion of the resource owner.

  • Permissions depend solely on security labels that match a user's formal clearance level.

  • Permissions are linked to predefined organizational roles, and users inherit rights by being placed into those roles.

ISC2 Certified in Cybersecurity (CC)
Access Control Concepts
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot