ECCouncil Certified Cybersecurity Technician (CCT) 212-82 Question # 37 Topic 4 Discussion

ECCouncil Certified Cybersecurity Technician (CCT) 212-82 Question # 37 Topic 4 Discussion

212-82 Exam Topic 4 Question 37 Discussion:
Question #: 37
Topic #: 4

In a multinational corporation, the IT department Implemented a new network security protocol for their global data centers. This protocol was designed to enhance security measures by incorporating advanced access control principles. The protocol employs a combination of methods to ensure that only authorized personnel can access sensitive data. Recently, an incident occurred where an unauthorized user gained access to confidential data. The securityteam discovered that the intruder exploited a specific aspect of the access control system. Which aspect of the access control principles, terminologies, and models was most likely exploited?


A.

Attribute-Based Access Control {ABAC), where access decisions are made based on a set of policies and attributes.


B.

Discretionary Access Control (DAC). where the resource owner decides on the access permissions.


C.

Role-Based Access Control (RBAC). where access is given based on the roles within the organization.


D.

Mandatory Access Control (MAC), where access decisions are made based on predefined rules set by the system s administrator.


Get Premium 212-82 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.