ISC2 Certified in Cybersecurity: Chapter 3 Exam Questions With 100% Correct Answers
ISC2 Certified in Cybersecurity: Chapter 3 Exam Questions With 100% Correct Answers A safeguard or countermeasure designed to preserve Confidentiality, Integrity and Availability of data. A Control _____ _____ involves limiting what objects can be available to what subjects according to what rules. Access Control Access is based on three elements. What are they? 1. Subjects 2. Objects 3. Rules Generally an individual, process or device causing information to flow among objects or change to the system state. NIST SP800-53 R4 Subject Any entity that request access to our access and is the imitator of a request for service. therefore it is referred to as "active". Subject -Is a user, a process, a procedure, a client (or a server), a program, a device such as an endpoint, workstation, smartphone or removable storage device with onboard firmware. -Is active: it initiates a request for access to resources or services. -Requests a service from an object. -Should have a level of clearance (permissions) that relates to its ability to successfully access service or resources. Subject Passive information system-related entity (e.g., devices, files, records, tables, processes, programs, domains) containing or receiving information. NIST SP 800- 53 Rev 4 Object A device process, person, user, program, server, client or other entity that responds to a request for service and is passive in that it takes no action until its called upon. Object -Is a building, a computer, a file, a database, a printer or scanner, a server, a communications resource, a block of memory, an input/output port, a person, a software task, thread or process -Is anything that provides service to a user. -Is passive. -Responds to a request. -May have a classification. Object An instruction developed to allow or deny access to a system by comparing the validated identity of the subject to an access control list. Rule This might be added to allow access from the inside network to the outside network. Rule -Compare multiple attributes to
Written for
- Institution
- ISC2
- Course
- ISC2
Document information
- Uploaded on
- March 4, 2024
- Number of pages
- 6
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
isc2 certified in cybersecurity chapter 3 exam qu