ISC2 Cybersecurity Certification Pre- Assessment Version 1 (New 2024/ 2025 Update) Questions and Verified Answers| 100% Correct | A Grade
QUESTION
... [Show More] Which of the following will have the most impact on determining the duration of log retention?
Answer:
Applicable laws
QUESTION
Which of the following statements is true?
Answer:
It is best to use a blend of controls in order to provide optimum security
QUESTION
A human guard monitoring a hidden camera could be considered a ______ control.
Answer:
Detective
QUESTION
Trina is a security practitioner at Triffid, Inc. Trina has been tasked with selecting a new product to serve as a security control in the environment. After doing some research, Trina selects a particular product. Before that product can be purchased, a manager must review Trina's selection and determine whether to approve the purchase. This is a description of:
Answer:
Segregation of duties
QUESTION
Trina and Doug both work at Triffid, Inc. Doug is having trouble logging into the network. Trina offers to log in for Doug, using Trina's credentials, so that Doug can get some work done.
What is the problem with this?
Answer:
Anything either of them do will be attributed to Trina
QUESTION
Gelbi is a Technical Support analyst for Triffid, Inc. Gelbi sometimes is required to install or remove software. Which of the following could be used to describe Gelbi's account?
Answer:
Privileged
QUESTION
Tekila works for a government agency. All data in the agency is assigned a particular sensitivity level, called a "classification." Every person in the agency is assigned a "clearance" level, which determines the classification of data each person can access.
What is the access control model being implemented in Tekila's agency?
Answer:
MAC (mandatory access control)
QUESTION
Prina is a database manager. Prina is allowed to add new users to the database, remove current users and create new usage functions for the users. Prina is not allowed to read the data in the fields of the database itself. This is an example of:
Answer:
Role-based access controls (RBAC)
QUESTION
Which of the following is probably most useful at the perimeter of a property?
Answer:
A fence
QUESTION
Which of the following roles does not typically require privileged account access?
Answer:
Data entry professional
QUESTION
Which of these is an example of a physical access control mechanism?
Answer:
A lock on a door
QUESTION
Visitors to a secure facility need to be controlled. Controls useful for managing visitors include all of the following except:
Answer:
Fence
QUESTION [Show Less]