VERIFIED 2026
During what phase of the change management process does the organization conduct peer review of
the change for accuracy and completeness? - ANSWER✔✔🌹-Analysis/Impact Assessment
Steve is responsible for work stations that handle proprietary information. What is the best option for
these workstations at the end of their lifecycle? - ANSWER✔✔🌹-Sanitization
What is the earliest stage of a fire to use detection technology to identify it? - ANSWER✔✔🌹-Incipient
What security control would provide the best defense against a threat actor trying to execute a buffer
overflow attack against a custom application? - ANSWER✔✔🌹-Parameter Checking/Input Validation
Which of the following is NOT true of the ISC2 Code of Ethics?
A. Adherence to the Code of Ethics is a condition of Certification
B. The code of ethics applies to all security professionals
C. Failure to comply with the Code of Ethics could result in revocation of certification
D. Members who observe a breach of the Code of Ethics are required to report the possible violation -
ANSWER✔✔🌹-B.
Under what type of software license does the recipient of software have an unlimited right to copy,
modify, distribute, or resell a software package? - ANSWER✔✔🌹-Public Domain
What should Steve do if a FAR/FRR diagram does not provide an acceptable performance level for his
organization's needs? - ANSWER✔✔🌹-Assess other biometric systems to compare them since the CER
is used to assess biometric devices.
,What is the CER in biometric device measurment? - ANSWER✔✔🌹-Crossover Error Rate is the number
that results when a biometric device is adjusted to provide equal false acceptance and false rejection
rates.
What type of access control would be the best choice for a person that would like to support a
declaration like "Only allow access to customer service on managed devices on the wireless network
between 8 am and 7 pm"? - ANSWER✔✔🌹-Attribute Based Access Control ABAC
What is the benefit of an ABAC over a RBAC? - ANSWER✔✔🌹-An ABAC can be more specific thus more
flexible
What is the primary advantage of decentralized access control? - ANSWER✔✔🌹-It provides control of
access to people closer to the resources
How are rules set in ABAC systems? - ANSWER✔✔🌹-Uses boolean logic statements which allow it to be
more flexible than RBAC for temporary rules such as to allow time limited access.
Which of the following is best described as an access control model that focuses on subjects and
identifies the objects that each subject can access?
A. Access control list
B. Capability Table
C. Implicit denial list
D. Rights Management Matrix - ANSWER✔✔🌹-B
Adam is accessing a standalone file server using a username and password provided by the server
administrator. Which one of the following entities is guaranteed to have information necessary to
complete the authorization process?
A. File Server
B. Adam
C. Server Administrator
,D. Adam's Supervisor - ANSWER✔✔🌹-A. The file server has the correct information on what activities
Adam is AUTHORIZED to perform
A new member at a 24 hour gym that uses fingerprints to gain access after hours is surprised to find out
that he is registering as a different member. What type of biometric factor error occurred? -
ANSWER✔✔🌹-Since he was accepted as a different member this was a Type 2 (false positive) error. If
he was not accepted and the door remained locked it would have been a Type 1 (false negative) error.
You are tasked with adjusting your organizations password requirements to make them align with best
practices from NIST. What should you set password expiration to? - ANSWER✔✔🌹-NIST Special
Publication 800-63b suggests that organizations should not impose password expiration requirements
on end users
What access control scheme labels subjects and objects and allows subjects to access objects when
labels match? - ANSWER✔✔🌹-Mandatory Access Control (MAC)
Mandatory Access Control is based on what type of model? - ANSWER✔✔🌹-Lattice Based
You need to create a trust relationship between your company and a vendor. You need to implement
the system so that it will allow users from the vendor's organization to access your accounts payable
system using the accounts created for them by the vendor. What type of authentication do you need to
implement? - ANSWER✔✔🌹-This type of authentication, where one domain trusts users from another
domain, is called federation.
Users change job positions quite often at your new company. Which type of access control would make
it easier to allow administrators to adjust permissions when these changes occur?
A. Role-Based Access Control
B. Mandatory Access Control
C. Discretionary Access Control
D. Rule-Based Access Control - ANSWER✔✔🌹-A Role-Based Access Control would assign permission to
roles and then the administrator would simply adjust the role of the user when he or she changes jobs
Which of the following authenticators is appropriate to use by itself rather than in combination with
other biometric factors?
, A. Voice pattern recognition
B. Hand geometry
C. Palm scans
D. Heart/pulse patterns - ANSWER✔✔🌹-C. Palm scans compare the vein patterns in the palm to a
database to authenticate a user.
As part of hiring a new employee, Sven's identity management team creates a new user object and
ensures that the user object is available in the directories and systems where it is needed. What is this
process called? - ANSWER✔✔🌹-Provisioning includes the creation, maintenance, and removal of user
objects from applications, systems, and directories.
The Linux filesystem allows the owners of objects to determine the access rights that subjects have to
them. What type of access control does Linux use? - ANSWER✔✔🌹-Discretionary Access Control
Mary's organization handles very sensitive governmental agency information. They need to implement
an access control system that allows administrators to set access rights but does not allow the
delegation of those rights to other users. What is the best type of access control design for Mary's
organization? - ANSWER✔✔🌹-Mandatory Access Control (MAC) systems allow an administrator to
configure access permissions but do not allow users to delegate permission to others.
What term is used to describe the default set of privileges assigned to a user when a new account is
created?
A. Aggregation
B. Transitivity
C. Baseline
D. Entitlement - ANSWER✔✔🌹-D. Entitlement refers to the privileges granted to useres when an
account is first provisioned.
Steve is the risk manager for a company on the east coast of the United States. He recently undertook a
replacement cost analysis and determined that rebuilding and reconfiguring the data center would cost
$20 million. Steve consulted with hurricane experts, data center specialists, and structural engineers and
they determined that a typical CAT 3 hurricane that successfully hits the east coast would cause
approximately $5 million in damages. The meteorologists determined that Steve's facility lies in an area
where they are likely to experience a CAT 3 hurricane once every 10 years.