100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ISC2 Certified in Cybersecurity: Chapter 3 Exam Questions With 100% Correct Answers

Rating
-
Sold
-
Pages
6
Grade
A+
Uploaded on
04-03-2024
Written in
2023/2024

ISC2 Certified in Cybersecurity: Chapter 3 Exam Questions With 100% Correct Answers A safeguard or countermeasure designed to preserve Confidentiality, Integrity and Availability of data. A Control _____ _____ involves limiting what objects can be available to what subjects according to what rules. Access Control Access is based on three elements. What are they? 1. Subjects 2. Objects 3. Rules Generally an individual, process or device causing information to flow among objects or change to the system state. NIST SP800-53 R4 Subject Any entity that request access to our access and is the imitator of a request for service. therefore it is referred to as "active". Subject -Is a user, a process, a procedure, a client (or a server), a program, a device such as an endpoint, workstation, smartphone or removable storage device with onboard firmware. -Is active: it initiates a request for access to resources or services. -Requests a service from an object. -Should have a level of clearance (permissions) that relates to its ability to successfully access service or resources. Subject Passive information system-related entity (e.g., devices, files, records, tables, processes, programs, domains) containing or receiving information. NIST SP 800- 53 Rev 4 Object A device process, person, user, program, server, client or other entity that responds to a request for service and is passive in that it takes no action until its called upon. Object -Is a building, a computer, a file, a database, a printer or scanner, a server, a communications resource, a block of memory, an input/output port, a person, a software task, thread or process -Is anything that provides service to a user. -Is passive. -Responds to a request. -May have a classification. Object An instruction developed to allow or deny access to a system by comparing the validated identity of the subject to an access control list. Rule This might be added to allow access from the inside network to the outside network. Rule -Compare multiple attributes to

Show more Read less
Institution
ISC2
Course
ISC2









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ISC2
Course
ISC2

Document information

Uploaded on
March 4, 2024
Number of pages
6
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TheStar Florida State University
View profile
Follow You need to be logged in order to follow users or courses
Sold
583
Member since
1 year
Number of followers
178
Documents
23565
Last sold
16 hours ago
Stuvia Prodigy

Tested, Verified and Updated Study Materials with 100% Guaranteed Success.

3.8

117 reviews

5
56
4
21
3
20
2
3
1
17

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions