What type of access control limits login capabilities to work hours only, as configured in Susan's workstation?

Prepare for the CISSP Domain 5 Exam. Hone your skills with identity and access management questions including hints and expert explanations. Get exam ready!

Multiple Choice

What type of access control limits login capabilities to work hours only, as configured in Susan's workstation?

Explanation:
The correct answer is time-based access control, as it directly relates to the limitation of login capabilities based on specific timeframes, such as work hours. Time-based access control is a security mechanism that restricts access to resources according to the time of day, ensuring that users can only log in during authorized periods. This is particularly useful for organizations that want to enhance their security measures by reducing the potential for unauthorized access outside of business hours. By implementing time-based access control, administrators can define access schedules that match legitimate business operations, thereby minimizing risks and exposure to attacks during off-hours when users may not be present. This type of control can help organizations comply with policies that dictate when users are permitted to access sensitive information or perform critical tasks. In contrast, role-based access control is focused on user roles and responsibilities rather than time limitations; mandatory access control enforces restrictions based on security levels and classifications; and context-dependent control considers various contextual information such as user location or device but does not specifically address time constraints.

The correct answer is time-based access control, as it directly relates to the limitation of login capabilities based on specific timeframes, such as work hours. Time-based access control is a security mechanism that restricts access to resources according to the time of day, ensuring that users can only log in during authorized periods. This is particularly useful for organizations that want to enhance their security measures by reducing the potential for unauthorized access outside of business hours.

By implementing time-based access control, administrators can define access schedules that match legitimate business operations, thereby minimizing risks and exposure to attacks during off-hours when users may not be present. This type of control can help organizations comply with policies that dictate when users are permitted to access sensitive information or perform critical tasks.

In contrast, role-based access control is focused on user roles and responsibilities rather than time limitations; mandatory access control enforces restrictions based on security levels and classifications; and context-dependent control considers various contextual information such as user location or device but does not specifically address time constraints.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy