exam questions

Exam SY0-501 All Questions

View all questions & answers for the SY0-501 exam

Exam SY0-501 topic 1 question 625 discussion

Actual exam question from CompTIA's SY0-501
Question #: 625
Topic #: 1
[All SY0-501 Questions]

A security administrator needs to configure remote access to a file share so it can only be accessed between the hours of 9:00 a.m. and 5:00 p.m. Files in the share can only be accessed by members of the same department as the data owner. Users should only be able to create files with approved extensions, which may differ by department. Which of the following access controls would be the MOST appropriate for this situation?

  • A. RBAC
  • B. MAC
  • C. ABAC
  • D. DAC
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
The_Temp
Highly Voted 5 years, 4 months ago
The below explanation confirms why the answer is C. "An example of ABAC would be allowing only users who are type=employees and have department=HR to access the HR/Payroll system and only during business hours within the same timezone as the company." https://blog.identityautomation.com/rbac-vs-abac-access-control-models-iam-explained
upvoted 13 times
BillyKidd
4 years, 8 months ago
Based on what you said, business hours (time-of-day) would be the key to looking at this, and time hours were mentioned in the question.
upvoted 3 times
...
...
MelvinJohn
Highly Voted 5 years, 5 months ago
C. Attribute-Based Access Control (ABAC) Role-based access control (RBAC) are two ways of controlling the authentication process and authorizing users. RBAC controls broad access across an organization, while ABAC takes a fine-grain approach.
upvoted 8 times
...
Eluis007
Most Recent 3 years, 8 months ago
Attribute-based access control (ABAC) is the most fine-grained type of access control model. As the name suggests, an ABAC system is capable of making access decisions based on a combination of subject attributes (in this case, files in the share can only be accessed by MEMBERS OF THE SAME DEPARTMENT AS THE DATA OWNER) and object attributes (in this case, users should only be able to create FILES WITH APPROVED EXTENSIONS, which may differ by department) plus any context-sensitive or system-wide attributes (in this case, it can only be accessed between the hours of 9:00 a.m. and 5:00 p.m). An attribute-based system could monitor the number of events or alerts associated with a user account or with a resource, or track access requests to ensure they are consistent in terms of timing of requests or geographic location C correct
upvoted 1 times
...
Tim13
4 years ago
So it's only role based access control if it's spelled out? How would you differentiate on a test
upvoted 1 times
...
fonka
4 years ago
Sory i change my mind after reading this Attribute-based access control draws on a set of characteristics called “attributes.” This includes user attributes, environmental attributes, and resource attributes. User attributes include things like the user’s name, role, organization, ID, and security clearance. Environmental attributes include the time of access, location of the data, and current organizational threat levels. Resource attributes include things like creation date, resource owner, file name, and data sensitivity. so the answer is Attribute base (ATBAC) Soory
upvoted 2 times
...
fonka
4 years ago
Rule-based access control The last of the four main types of access control for businesses is rule-based access control. This system assigns or denies access to users based on a set of dynamic rules and limitations defined by the owner or system administrator. Such rules may limit access based on a number of unique situations, such as the individual's location, the time of day, or the device being used. The ability to customize rules and permissions makes RBAC an ideal form of access control for businesses that require a dynamic security solution.
upvoted 1 times
...
fonka
4 years ago
It.is rule based access control in short management is saying is no acess is given after 5pm meaning that is a rule no one can complain about and if it is a library system same thing no access is given after working hours so the answer is A rbac
upvoted 1 times
...
nakres64
4 years, 4 months ago
Attribute-based access control (ABAC) is the most fine-grained type of access control model. As the name suggests, an ABAC system is capable of making access decisions based on a combination of subject and object attributes plus any context-sensitive or system-wide attributes.
upvoted 1 times
...
Tzu
5 years, 3 months ago
ABAC because RULE BASED ACCESS CONTROL wasn’t spelled out.
upvoted 6 times
babati
4 years, 11 months ago
Rule-based access control is a term that can refer to any sort of access control model where access control policies are determined by system-enforced rules rather than system users. As such, RBAC, ABAC, and MAC are all examples of rule-based (or non-discretionary) access control. As well as the formal models, rule-based access control principles are increasingly being implemented to protect computer and network systems founded on discretionary access from the sort of misconfiguration that can occur through DAC.
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...