100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4,6 TrustPilot
logo-home
Exam (elaborations)

ISC2 Certified in Cybersecurity Chapter 3 Exam with solutions

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
09-01-2026
Written in
2025/2026

ISC2 Certified in Cybersecurity Chapter 3 Exam with solutions

Institution
ISC2 Certified In Cybersecurity
Course
ISC2 Certified in Cybersecurity









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ISC2 Certified in Cybersecurity
Course
ISC2 Certified in Cybersecurity

Document information

Uploaded on
January 9, 2026
Number of pages
8
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

2



ISC2 Certified in Cybersecurity Chapter 3 Exam with
|| || || || || || || ||




solutions


A safeguard or countermeasure designed to preserve Confidentiality, Integrity and Availability of
|| || || || || || || || || || || ||




data.
A Control
||




_____ _____ involves limiting what objects can be available to what subjects according to what
|| || || || || || || || || || || || || || ||




rules.
Access Control ||




Access is based on three elements. What are they?
|| || || || || || || ||




1. Subjects
||




2. Objects
||




3. Rules
||




Generally an individual, process or device causing information to flow among objects or change
|| || || || || || || || || || || || || ||




to the system state. NIST SP800-53 R4
|| || || || || ||




Subject
Any entity that request access to our access and is the imitator of a request for service. therefore it
|| || || || || || || || || || || || || || || || || || ||




is referred to as "active".
|| || || ||




Subject
-Is a user, a process, a procedure, a client (or a server), a program, a device such as an endpoint,
|| || || || || || || || || || || || || || || || || || || ||




workstation, smartphone or removable storage device with onboard firmware. || || || || || || || ||




-Is active: it initiates a request for access to resources or services.
|| || || || || || || || || || ||




-Requests a service from an object. || || || || ||




-Should have a level of clearance (permissions) that relates to its ability to successfully access
|| || || || || || || || || || || || || || ||




service or resources. || ||




Subject
Passive information system-related entity (e.g., devices, files, records, tables, processes,
|| || || || || || || || || ||




programs, domains) containing or receiving information. NIST SP 800-53 Rev 4
|| || || || || || || || || ||




Object

, 2


A device process, person, user, program, server, client or other entity that responds to a request for
|| || || || || || || || || || || || || || || ||




service and is passive in that it takes no action until its called upon.
|| || || || || || || || || || || || || ||




Object
-Is a building, a computer, a file, a database, a printer or scanner, a server, a communications
|| || || || || || || || || || || || || || || || ||




resource, a block of memory, an input/output port, a person, a software task, thread or process
|| || || || || || || || || || || || || || ||




-Is anything that provides service to a user.
|| || || || || || ||




-Is passive. ||




-Responds to a request. || || ||




-May have a classification. || || ||




Object
An instruction developed to allow or deny access to a system by comparing the validated identity
|| || || || || || || || || || || || || || || ||




of the subject to an access control list.
|| || || || || || ||




Rule
This might be added to allow access from the inside network to the outside network.
|| || || || || || || || || || || || || ||




Rule
-Compare multiple attributes to determine appropriate access || || || || || ||




-Allow access to an object. || || || ||




-Define how much access is allowed. || || || || ||




-Deny access to an object. || || || ||




-Apply time-based access. || ||




Rule
Devices that enforce administrative security policies by filtering incoming traffic based on a set of
|| || || || || || || || || || || || || ||




rules.
||




Firewall
The use of multiple controls arranged in series to provide several consecutive controls to protect
|| || || || || || || || || || || || || || ||




an asset; also called defense in depth.
|| || || || || ||




Layered Defense ||




Information security strategy integrating people, technology, and operations capabilities to || || || || || || || || || ||




establish variable barriers across multiple layers and missions of the organization. NIST SP 800-
|| || || || || || || || || || || || ||




53 Rev 4 || ||




Defense in Depth || ||

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Ruiz Liberty University
Follow You need to be logged in order to follow users or courses
Sold
84
Member since
1 year
Number of followers
1
Documents
12239
Last sold
3 days ago
Top-Quality Study Materials for Success – Ace Your Exams with Expert Resources!

Access high-quality study materials to help you excel in your exams. Get notes, summaries, and guides tailored to your courses!

3,2

9 reviews

5
3
4
1
3
2
2
1
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions