A research firm adopted an access framework that checks user location, security clearance, and project code upon each file request. Permissions can change if the user's role or department changes. Which model is in use?
An approach that grants or revokes permissions based on owner preference
An approval that matches user tasks to predefined job categories
An evaluation that examines user properties and resource details to decide access
A label assignment that manages a single classification tag per data object
The model reevaluates multiple factors whenever a request occurs. This approach aligns with attribute-based controls, which assess user properties, resource details, and contextual information to grant or deny access. Other methods depend on static roles, a single classification label, or discretionary choices, and do not handle shifting user or resource factors.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is attribute-based access control (ABAC)?
Open an interactive chat with Bash
How does ABAC differ from role-based access control (RBAC)?
Open an interactive chat with Bash
What are some real-world examples of ABAC in action?