ISC2 CISSP Practice Question

Which of the following describes an ABAC approach to system, network, or data access?

  • Access control that assigns permissions according to the individual's specified position within the organization.

  • Access limitations implemented based on the type of device connecting to the system, rather than user-specific attributes.

  • Access control driven by set conditions that dictate permissions for certain actions based on predefined criteria.

  • Access management techniques that modify permissions based on the progression of a user through various organizational functions.

ISC2 CISSP
Identity and Access Management (IAM)
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot