CISA Exam Questions: Which Three Solutions Are Examples Of Logical Access Control? (Choose Three.)

Three logical access control solutions are: 1) Role-Based Access Control (RBAC) (rights assigned by job function), 2) Multi-Factor Authentication (MFA) (verification via multiple credentials), and 3) Access Control Lists (ACLs) (rule-based network/data permissions). For ISACA CISA (Certified Information Systems Auditor) candidates, mastering these controls along with audit trails and IAM policies is critical for assessing security frameworks. Study4Pass offers CISA exam prep materials, including real-world access control audits and compliance scenarios, to ensure you can evaluate and enforce least-privilege principles with confidence!

Tech Professionals

06 May 2025

CISA Exam Questions: Which Three Solutions Are Examples Of Logical Access Control? (Choose Three.)

The ISACA Certified Information Systems Auditor (CISA) certification is a globally recognized credential for professionals specializing in IT audit, control, and security. It validates expertise in assessing and managing information systems to ensure security, compliance, and operational efficiency. The exam question, “Which three solutions are examples of logical access control? (Choose three.)” identifies Role-Based Access Control (RBAC), Mandatory Access Control (MAC), and Discretionary Access Control (DAC) as key examples, tested within Domain 5: Protection of Information Assets (25%). This domain focuses on securing data and systems through access controls, auditing, and risk management, critical for roles like IT auditors, compliance officers, and security analysts.

The ISACA CISA (Certified Information Systems Auditor) Certification Exam, lasting 4 hours with 150 multiple-choice questions, requires a passing score of 450 (on a 200–800 scale). It emphasizes practical scenarios, such as evaluating access control effectiveness in enterprise environments. Study4Pass is a premier resource for CISA preparation, offering comprehensive study guides, practice exams, and hands-on labs tailored to the exam syllabus. This article explores logical access controls, their implementation, security implications, and strategic preparation tips using Study4Pass to excel in the ISACA CISA certification exam.

Introduction to Logical Access Controls

Definition & Importance

Logical access controls are security mechanisms implemented through software or systems to regulate access to digital resources, such as data, applications, or networks, based on user identity, permissions, or predefined policies. Unlike physical access controls (e.g., locks, biometrics), logical controls operate in the digital realm, ensuring only authorized users can interact with sensitive information or systems.

Key Functions:

  • Authentication: Verifying user identity (e.g., passwords, tokens).
  • Authorization: Granting access based on roles or rules (e.g., read-only vs. admin).
  • Auditing: Tracking access attempts for compliance and incident response.

Importance:

  • Data Protection: Prevents unauthorized access to sensitive data (e.g., financial records, PII).
  • Compliance: Aligns with regulations like GDPR, HIPAA, and PCI-DSS.
  • Risk Mitigation: Reduces insider threats and external attacks (e.g., credential theft).

For ISACA Certified Information Systems Auditor (CISA) candidates, mastering logical access controls is critical, as they underpin information system security and audit processes. Study4Pass offers comprehensive resources, including study guides and practice exams, to ensure exam success.

Relevance to CISA Exam

The CISA exam, part of the globally recognized certification for IT audit professionals, tests expertise across five domains, with Domain 5: Protection of Information Assets (25%) covering logical access controls. The question, “Which three solutions are examples of logical access control? (Choose three.)” highlights Role-Based Access Control (RBAC), Mandatory Access Control (MAC), and Discretionary Access Control (DAC) as key examples, tested in objectives like “Evaluate the effectiveness of access controls.” Candidates must:

  • Identify logical access control types.
  • Understand their implementation and security implications.
  • Assess controls in audit scenarios.

The CISA exam, lasting 4 hours with 150 multiple-choice questions, requires a passing score of 450 (on a 200–800 scale). Study4Pass aligns its resources with these objectives, offering labs and practice questions that mirror real-world audit scenarios.

Three Key Examples of Logical Access Control (Exam Focus)

The CISA exam question asks for three examples of logical access control. The answers are:

Role-Based Access Control (RBAC)

  • Definition: Grants access based on a user’s role within an organization, aligning permissions with job functions.
  • Key Features:
    o    Role Hierarchy: Defines roles (e.g., employee, manager, admin) with specific permissions.
    o    Scalability: Simplifies management for large organizations.
    o    Least Privilege: Ensures users access only what their role requires.
  • Example: A payroll clerk can view salary data but cannot modify it, while a payroll manager can edit records.
  • Implementation: Configured in systems like Active Directory (e.g., group policies) or HR platforms.
  • CISA Relevance: Questions may test RBAC’s role in compliance and segregation of duties.

Mandatory Access Control (MAC)

  • Definition: Enforces access based on predefined security labels (e.g., classification levels like confidential, secret) assigned to users and resources.
  • Key Features:
    o    Non-Discretionary: Admins, not users, set access rules.
    o    High Security: Used in government or military systems.
    o    Sensitivity Labels: Matches user clearance to resource classification.
  • Example: A user with “secret” clearance cannot access “top secret” documents, regardless of role.
  • Implementation: Found in systems like SELinux or Trusted Solaris.
  • CISA Relevance: Questions may focus on MAC’s rigidity and auditability.

Discretionary Access Control (DAC)

  • Definition: Allows resource owners to define access permissions, granting flexibility to users.
  • Key Features:
    o    Owner-Controlled: Owners decide who can access their files or data.
    o    Flexible: Common in commercial systems (e.g., Windows NTFS).
    o    Risk of Misconfiguration: Owners may grant excessive permissions.
  • Example: A project manager shares a document with team members but restricts external access.
  • Implementation: Configured via file permissions (e.g., chmod in Linux, NTFS ACLs).
  • CISA Relevance: Questions may test DAC’s risks and audit requirements.

Study4Pass flashcards highlight RBAC, MAC, and DAC, ensuring quick recall for exam questions.

Comparison of Logical Access Models

Aspect

RBAC

MAC

DAC

Control Basis

User roles

Security labels

Resource owner discretion

Flexibility

Moderate (role-based)

Low (rigid rules)

High (owner-defined)

Security Level

Medium (scalable, least privilege)

High (strict enforcement)

Variable (depends on owner)

Use Case

Enterprises, HR systems

Military, government

Commercial, file sharing

Audit Complexity

Moderate (role audits)

High (label verification)

High (owner permissions)

Example System

Active Directory

SELinux

Windows NTFS

Key Insight: RBAC balances scalability and security, MAC prioritizes strict control, and DAC offers flexibility but risks misconfiguration. For CISA candidates, understanding these distinctions is critical for audit and security assessments. Study4Pass guides include comparison tables, supported by Practice Questions on access control applications.

CISA Exam Application

How Questions Are Framed

  • Multiple-Choice: “Which three solutions are examples of logical access control? (Choose three.)” (Answer: RBAC, MAC, DAC).
  • Identification: Select the access control for a scenario (e.g., MAC for military systems).
  • Evaluation: Assess the effectiveness of RBAC in ensuring least privilege.
  • Example: “Which access control requires security labels?” (Answer: MAC).
  • Study4Pass Tip: Practice 50 access control-focused questions.

Scenario-Based Questions

  • Type: Audit access controls or recommend solutions for compliance.
  • Example: “An organization uses file-level permissions set by employees. What risks should an auditor evaluate?” (Answer: DAC misconfiguration).
  • Strategy: Map scenarios to RBAC (enterprise), MAC (high-security), or DAC (flexible) based on context.
  • Study4Pass Tip: Use scenario labs to simulate audit processes.

Study4Pass practice exams cover these formats, ensuring readiness for real-world audit scenarios.

Implementation Best Practices

Enterprise Deployments

  1. RBAC:
    o    Practice: Define roles based on job functions (e.g., finance, IT, HR).
    o    Example: Use Active Directory groups to assign “read-only” access to auditors.
    o    Benefit: Simplifies management, enforces least privilege.
  2. MAC:
    o    Practice: Assign classification labels (e.g., public, confidential) to resources.
    o    Example: Implement SELinux for a defense contractor’s servers.
    o    Benefit: Ensures strict access for sensitive data.
  3. DAC:
    o    Practice: Train owners on secure permission settings.
    o    Example: Configure NTFS to limit shared folder access to project teams.
    o    Benefit: Balances flexibility with oversight.

Monitoring & Auditing

  • Practice: Use tools like Splunk or Microsoft Sentinel to log access attempts.
  • Example: Audit RBAC roles quarterly to detect over-privileged accounts.
  • Commands:
    o    Windows: net user (check group memberships).
    o    Linux: getfacl (view DAC permissions).
  • Benefit: Ensures compliance and detects unauthorized access.
  • Study4Pass Tip: Practice audit labs to simulate monitoring.

Study4Pass labs provide virtual environments for configuring and auditing access controls, ensuring hands-on proficiency.

Study Resources & Mnemonics

Memory Aid

  • Mnemonic: “RMD” (RBAC: Roles, MAC: Mandatory, DAC: Discretionary).
  • Visualization: Picture RBAC as a company org chart, MAC as a military vault, DAC as a shared Google Drive.
  • Study4Pass Tip: Use flashcards to reinforce “RMD” and definitions.

ISACA Resources

  • Official Guide: ISACA’s CISA Review Manual (28th Edition) covers logical access controls.
  • Question Bank: ISACA’s QAE database for practice questions.
  • Study4Pass Advantage: Consolidates ISACA content with interactive labs and concise summaries.

Hands-On Learning

  1. Lab 1: RBAC Configuration:
    o    Set up Active Directory groups for “Employee” and “Manager” roles.
    o    Assign permissions and test access.
    o    Outcome: Mastered role-based access.
  2. Lab 2: MAC Simulation:
    o    Configure SELinux with “confidential” labels on files.
    o    Test access with different user clearances.
    o    Outcome: Understood mandatory controls.
  3. Lab 3: DAC Audit:
    o    Set NTFS permissions on a shared folder.
    o    Audit for excessive access using PowerShell.
    o    Outcome: Learned DAC risks and auditing.
  • Tool: Study4Pass virtual labs with Windows/Linux environments.

Study Plan

  • Weeks 1–2: Memorize RBAC, MAC, DAC definitions and differences.
  • Weeks 3–4: Practice labs (Active Directory, SELinux, NTFS).
  • Weeks 5–6: Solve 100-question practice tests, focus on scenarios.
  • Study4Pass Tip: Join forums for peer discussions on access control audits.

Emerging Trends

Attribute-Based Access Control (ABAC)

  • Definition: Grants access based on attributes (e.g., user location, device type, time) rather than roles or labels.
  • Features:
    o    Dynamic: Adapts to context (e.g., deny access outside business hours).
    o    Granular: Combines multiple attributes for fine-tuned control.
  • Example: A user accesses data only from a corporate device in the office.
  • CISA Relevance: Questions may test ABAC’s role in modern security frameworks.
  • Study4Pass Tip: Review ABAC as an evolution of RBAC.

Zero Trust Implications

  • Definition: Assumes no trust, requiring continuous verification for access.
  • Impact on Logical Controls:
    o    RBAC: Enhanced with dynamic role validation.
    o    MAC: Integrated with real-time label checks.
    o    DAC: Limited use due to owner flexibility.
  • Example: Zero Trust verifies user identity and device compliance before granting access, even with RBAC roles.
  • CISA Relevance: Questions may explore Zero Trust’s alignment with logical controls.
  • Study4Pass Tip: Study Zero Trust principles for advanced questions.

Study4Pass guides cover these trends, preparing candidates for forward-looking exam content.

Conclusion & Exam Strategy

The ISACA CISA certification equips IT auditors with skills to secure information systems, with logical access controls—RBAC, MAC, and DAC—as critical topics in Protection of Information Assets. These controls ensure authorized access, compliance, and risk mitigation in enterprise environments. Mastering their implementation, auditing, and security implications is key to exam success and real-world audit proficiency.

Study4Pass is the ultimate resource for CISA preparation, offering study guides, practice exams, and hands-on labs that replicate real-world audit scenarios. Its access control-focused labs and scenario-based questions ensure candidates can configure, audit, and troubleshoot RBAC, MAC, and DAC confidently. With Study4Pass, aspiring CISA professionals can ace the exam and launch rewarding careers, with salaries averaging $90,000–$130,000 annually (Glassdoor, 2025).

Exam Strategy:

  • Memorize: Use “RMD” mnemonic for RBAC, MAC, DAC.
  • Practice: Configure access controls in Study4Pass labs for hands-on tasks.
  • Scenarios: Map audit scenarios to appropriate controls (e.g., MAC for military).
  • Trends: Review ABAC and Zero Trust for advanced questions.
  • Timing: Complete timed 150-question practice tests to manage the 4-hour exam.

Special Discount: Offer Valid For Limited Time "ISACA CISA Exam Prep Materials"

Practice Questions from ISACA CISA Certification Exam

Which three solutions are examples of logical access control? (Choose three.)

A. Biometric scanners
B. Role-Based Access Control (RBAC)
C. Mandatory Access Control (MAC)
D. Discretionary Access Control (DAC)
E. Security guards

An auditor evaluates an organization using security labels to restrict data access. Which access control is in use?

A. RBAC
B. MAC
C. DAC
D. ABAC

Which access control model is most susceptible to misconfiguration by resource owners?

A. RBAC
B. MAC
C. DAC
D. Physical access control

A company uses Active Directory groups to assign permissions based on job roles. Which access control model is this?

A. MAC
B. DAC
C. RBAC
D. ABAC

What is a key benefit of implementing RBAC in a large organization?

A. Owner flexibility
B. Scalability and least privilege
C. Rigid security labels
D. Physical access enforcement