Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ISC2 Certified in Cybersecurity Chapter 3 Exam with solutions

Beoordeling
-
Verkocht
-
Pagina's
8
Cijfer
A+
Geüpload op
09-01-2026
Geschreven in
2025/2026

ISC2 Certified in Cybersecurity Chapter 3 Exam with solutions

Instelling
ISC2 Certified In Cybersecurity
Vak
ISC2 Certified in Cybersecurity

Voorbeeld van de inhoud

2



ISC2 Certified in Cybersecurity Chapter 3 Exam with
|| || || || || || || ||




solutions


A safeguard or countermeasure designed to preserve Confidentiality, Integrity and Availability of
|| || || || || || || || || || || ||




data.
A Control
||




_____ _____ involves limiting what objects can be available to what subjects according to what
|| || || || || || || || || || || || || || ||




rules.
Access Control ||




Access is based on three elements. What are they?
|| || || || || || || ||




1. Subjects
||




2. Objects
||




3. Rules
||




Generally an individual, process or device causing information to flow among objects or change
|| || || || || || || || || || || || || ||




to the system state. NIST SP800-53 R4
|| || || || || ||




Subject
Any entity that request access to our access and is the imitator of a request for service. therefore it
|| || || || || || || || || || || || || || || || || || ||




is referred to as "active".
|| || || ||




Subject
-Is a user, a process, a procedure, a client (or a server), a program, a device such as an endpoint,
|| || || || || || || || || || || || || || || || || || || ||




workstation, smartphone or removable storage device with onboard firmware. || || || || || || || ||




-Is active: it initiates a request for access to resources or services.
|| || || || || || || || || || ||




-Requests a service from an object. || || || || ||




-Should have a level of clearance (permissions) that relates to its ability to successfully access
|| || || || || || || || || || || || || || ||




service or resources. || ||




Subject
Passive information system-related entity (e.g., devices, files, records, tables, processes,
|| || || || || || || || || ||




programs, domains) containing or receiving information. NIST SP 800-53 Rev 4
|| || || || || || || || || ||




Object

, 2


A device process, person, user, program, server, client or other entity that responds to a request for
|| || || || || || || || || || || || || || || ||




service and is passive in that it takes no action until its called upon.
|| || || || || || || || || || || || || ||




Object
-Is a building, a computer, a file, a database, a printer or scanner, a server, a communications
|| || || || || || || || || || || || || || || || ||




resource, a block of memory, an input/output port, a person, a software task, thread or process
|| || || || || || || || || || || || || || ||




-Is anything that provides service to a user.
|| || || || || || ||




-Is passive. ||




-Responds to a request. || || ||




-May have a classification. || || ||




Object
An instruction developed to allow or deny access to a system by comparing the validated identity
|| || || || || || || || || || || || || || || ||




of the subject to an access control list.
|| || || || || || ||




Rule
This might be added to allow access from the inside network to the outside network.
|| || || || || || || || || || || || || ||




Rule
-Compare multiple attributes to determine appropriate access || || || || || ||




-Allow access to an object. || || || ||




-Define how much access is allowed. || || || || ||




-Deny access to an object. || || || ||




-Apply time-based access. || ||




Rule
Devices that enforce administrative security policies by filtering incoming traffic based on a set of
|| || || || || || || || || || || || || ||




rules.
||




Firewall
The use of multiple controls arranged in series to provide several consecutive controls to protect
|| || || || || || || || || || || || || || ||




an asset; also called defense in depth.
|| || || || || ||




Layered Defense ||




Information security strategy integrating people, technology, and operations capabilities to || || || || || || || || || ||




establish variable barriers across multiple layers and missions of the organization. NIST SP 800-
|| || || || || || || || || || || || ||




53 Rev 4 || ||




Defense in Depth || ||

Geschreven voor

Instelling
ISC2 Certified in Cybersecurity
Vak
ISC2 Certified in Cybersecurity

Documentinformatie

Geüpload op
9 januari 2026
Aantal pagina's
8
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€13,46
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kan je een ander document kiezen. Je kan het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Ruiz Liberty University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
93
Lid sinds
1 jaar
Aantal volgers
1
Documenten
13425
Laatst verkocht
4 dagen geleden
Top-Quality Study Materials for Success – Ace Your Exams with Expert Resources!

Access high-quality study materials to help you excel in your exams. Get notes, summaries, and guides tailored to your courses!

3,0

12 beoordelingen

5
4
4
1
3
2
2
1
1
4

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen