ISC2 Cybersecurity Certification Exam (New 2024/ 2025 Update) Questions and Verified Answers| 100% Correct | Grade A
ISC2 Cybersecurity Certification Exam (New 2024/ 2025 Update) Questions and Verified Answers| 100% Correct | Grade A QUESTION Which of the following would be considered a logical access control? A. An iris reader that allows an employee to enter a controlled area. B. A fingerprint reader that allows an employee to enter a controlled area. C. A fingerprint reader that allows an employee to access a laptop computer. D. A chain attached to a laptop computer that connects it to furniture so it cannot be taken. Answer: C. A fingerprint reader that allows an employee to access a laptop computer. QUESTION Which of the following is probably most useful at the perimeter of a property? A. A safe B. A fence C. A data center D. A centralized log storage facility Answer: B. A fence QUESTION Handel is a senior manager at Triffid, Inc., and is in charge of implementing a new access control scheme for the company. Handel wants to ensure that employees who are assigned to new positions in the company do not retain whatever access they had in their old positions. Which method should Handel select? A. Role-based access controls (RBAC) B. Mandatory access controls (MAC) C. Discretionary access controls (DAC) D. Logging Answer: A. Role-based access controls (RBAC) QUESTION Prina is a database manager. Prina is allowed to add new users to the database, remove current users and create new usage functions for the users. Prina is not allowed to read the data in the fields of the database itself. This is an example of: A. Role-based access controls (RBAC) B. Mandatory access controls (MAC) C. Discretionary access controls (DAC) D. Alleviating threat access controls (ATAC) Answer: A. Role-based access controls (RBAC) QUESTION Gary is unable to log in to the production environment. Gary tries three times and is then locked out of trying again for one hour. Why? A. Gary is being punished B. The network is tired C. Users remember their credentials if they are given time to think about it D. Gary's actions look like an attack Answer: D. Gary's actions look like an attack QUESTION Larry and Fern both work in the data center. In order to enter the data center to begin their workday, they must both present their own keys (which are different) to the key re
Geschreven voor
- Instelling
- ISC2 Cybersecurity Certification
- Vak
- ISC2 Cybersecurity Certification
Documentinformatie
- Geüpload op
- 28 mei 2024
- Aantal pagina's
- 48
- Geschreven in
- 2023/2024
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
which of the following will have the most impact o
-
isc2 cybersecurity certification exam new 20
-
larry and fern both work in the data center in or
-
which of the following would be considered a logi
Ook beschikbaar in voordeelbundel