Which access control model grants access decisions based on the resource owner's discretion?

Prepare for the Certified Identity and Access Manager Exam using flashcards and multiple-choice questions. Gain insights into the exam format, practice with real-world scenarios, and ensure your success in becoming a certified professional.

Multiple Choice

Which access control model grants access decisions based on the resource owner's discretion?

Explanation:
Discretionary Access Control is the model where the resource owner decides who can access it and what they can do. The owner sets permissions for individuals or groups (read, write, execute) and can grant or revoke them as they see fit, often using access control lists or capability tokens. This puts the authority to grant access in the hands of the owner, which is the defining feature of DAC. Data Integrity focuses on preventing unauthorized changes to data, not on who may access it. An Access Provisioning Solution is about how access is granted or managed, but not the policy that the owner uses to control access. Access Logs Review deals with monitoring and auditing access after it happens, not with who is allowed to access in the first place.

Discretionary Access Control is the model where the resource owner decides who can access it and what they can do. The owner sets permissions for individuals or groups (read, write, execute) and can grant or revoke them as they see fit, often using access control lists or capability tokens. This puts the authority to grant access in the hands of the owner, which is the defining feature of DAC.

Data Integrity focuses on preventing unauthorized changes to data, not on who may access it. An Access Provisioning Solution is about how access is granted or managed, but not the policy that the owner uses to control access. Access Logs Review deals with monitoring and auditing access after it happens, not with who is allowed to access in the first place.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy