ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question

During the design of a government analytics platform that stores documents labeled Confidential, Secret, and Top Secret, the security architect decides that a single security administration office will assign clearances, and individual users must never be able to change who can read or write a file. Which access control model best meets this requirement?

  • Implement a mandatory access control (MAC) scheme that uses centrally managed security labels to enforce access decisions.

  • Adopt an attribute-based access control (ABAC) model that evaluates user and resource attributes at run time.

  • Use discretionary access control (DAC) so each document owner can grant read or write permissions as needed.

  • Create role-based access control (RBAC) roles that correspond to the Confidential, Secret, and Top Secret classifications.

ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Implementation
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot