100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

ISC2 Certified in Cybersecurity Chapter 3 Exam with solutions

Puntuación
-
Vendido
-
Páginas
8
Grado
A+
Subido en
09-01-2026
Escrito en
2025/2026

ISC2 Certified in Cybersecurity Chapter 3 Exam with solutions

Institución
ISC2 Certified In Cybersecurity
Grado
ISC2 Certified in Cybersecurity









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
ISC2 Certified in Cybersecurity
Grado
ISC2 Certified in Cybersecurity

Información del documento

Subido en
9 de enero de 2026
Número de páginas
8
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

2



ISC2 Certified in Cybersecurity Chapter 3 Exam with
|| || || || || || || ||




solutions


A safeguard or countermeasure designed to preserve Confidentiality, Integrity and Availability of
|| || || || || || || || || || || ||




data.
A Control
||




_____ _____ involves limiting what objects can be available to what subjects according to what
|| || || || || || || || || || || || || || ||




rules.
Access Control ||




Access is based on three elements. What are they?
|| || || || || || || ||




1. Subjects
||




2. Objects
||




3. Rules
||




Generally an individual, process or device causing information to flow among objects or change
|| || || || || || || || || || || || || ||




to the system state. NIST SP800-53 R4
|| || || || || ||




Subject
Any entity that request access to our access and is the imitator of a request for service. therefore it
|| || || || || || || || || || || || || || || || || || ||




is referred to as "active".
|| || || ||




Subject
-Is a user, a process, a procedure, a client (or a server), a program, a device such as an endpoint,
|| || || || || || || || || || || || || || || || || || || ||




workstation, smartphone or removable storage device with onboard firmware. || || || || || || || ||




-Is active: it initiates a request for access to resources or services.
|| || || || || || || || || || ||




-Requests a service from an object. || || || || ||




-Should have a level of clearance (permissions) that relates to its ability to successfully access
|| || || || || || || || || || || || || || ||




service or resources. || ||




Subject
Passive information system-related entity (e.g., devices, files, records, tables, processes,
|| || || || || || || || || ||




programs, domains) containing or receiving information. NIST SP 800-53 Rev 4
|| || || || || || || || || ||




Object

, 2


A device process, person, user, program, server, client or other entity that responds to a request for
|| || || || || || || || || || || || || || || ||




service and is passive in that it takes no action until its called upon.
|| || || || || || || || || || || || || ||




Object
-Is a building, a computer, a file, a database, a printer or scanner, a server, a communications
|| || || || || || || || || || || || || || || || ||




resource, a block of memory, an input/output port, a person, a software task, thread or process
|| || || || || || || || || || || || || || ||




-Is anything that provides service to a user.
|| || || || || || ||




-Is passive. ||




-Responds to a request. || || ||




-May have a classification. || || ||




Object
An instruction developed to allow or deny access to a system by comparing the validated identity
|| || || || || || || || || || || || || || || ||




of the subject to an access control list.
|| || || || || || ||




Rule
This might be added to allow access from the inside network to the outside network.
|| || || || || || || || || || || || || ||




Rule
-Compare multiple attributes to determine appropriate access || || || || || ||




-Allow access to an object. || || || ||




-Define how much access is allowed. || || || || ||




-Deny access to an object. || || || ||




-Apply time-based access. || ||




Rule
Devices that enforce administrative security policies by filtering incoming traffic based on a set of
|| || || || || || || || || || || || || ||




rules.
||




Firewall
The use of multiple controls arranged in series to provide several consecutive controls to protect
|| || || || || || || || || || || || || || ||




an asset; also called defense in depth.
|| || || || || ||




Layered Defense ||




Information security strategy integrating people, technology, and operations capabilities to || || || || || || || || || ||




establish variable barriers across multiple layers and missions of the organization. NIST SP 800-
|| || || || || || || || || || || || ||




53 Rev 4 || ||




Defense in Depth || ||
$14.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Ruiz Liberty University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
84
Miembro desde
1 año
Número de seguidores
1
Documentos
12239
Última venta
3 días hace
Top-Quality Study Materials for Success – Ace Your Exams with Expert Resources!

Access high-quality study materials to help you excel in your exams. Get notes, summaries, and guides tailored to your courses!

3.2

9 reseñas

5
3
4
1
3
2
2
1
1
2

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes