Access Control Model Simulator
Apply RBAC, DAC, MAC, and ABAC to the same access requests in a hospital environment. See how the same request gets different results under different models — and understand why.
What You’ll Practice
- Determining whether an access request is allowed or denied under RBAC (role-based), DAC (owner-based), MAC (label-based), and ABAC (attribute-based)
- Understanding the Bell-LaPadula properties: “no read up” (Simple Security) and “no write down” (Star Property)
- Seeing how ABAC uses environmental context (time, location, device) to make decisions the other models can’t
- Comparing model tradeoffs: flexibility vs. strictness, user control vs. system enforcement
- Recognizing which model CompTIA expects for different scenarios
How the Exam Tests This
Objective 4.5 covers access control implementation. CompTIA tests whether you understand the behavioral differences between models — not just definitions. Questions like “Under MAC, can a user with Secret clearance write to a Confidential document?” or “Which model considers time of day and device type?” require applied understanding, not memorized terms.
Scoring
Each access attempt is evaluated under all four models (RBAC, DAC, MAC, ABAC). Per-model accuracy is tracked so you can identify which model you need to study more.
MISSION
The same access request. Four different access control models. Different outcomes.
For each access attempt, you'll decide whether it's allowed or denied under RBAC, DAC, MAC, and ABAC. This builds the intuition CompTIA tests — knowing not just what each model is, but how they behave differently in the same situation.