All Coursera Quiz Answers

Access Control Concepts Module 6 Controls Quiz Answers

In this blog post, we provide the answers to the quiz for the ISC2 course “Access Control Concepts.” Specifically, we cover the Module 6 Controls Quiz Answers to help learners reinforce their knowledge of important access control concepts. This resource is designed to assist with exam preparation and practical applications in cybersecurity and related fields.

Access Control Concepts
Module 6 Controls Quiz Answers

 

Controls Quiz Answers

Question 1)
Which of the following is a subject? (D 3, L3.1.1)

  • A file
  • A fence
  • A filename
  • A user

Question 2)
Lia works in the security office. During research, Lia learns that a configuration change could better protect the organization’s IT environment. Lia makes a proposal for this change, but the change cannot be implemented until it is approved, tested, and then cleared for deployment by the Change Control Board. This is an example of __________. (D3, L3.1.1)

  • Defense in depth
  • Holistic security
  • Threat intelligence
  • Segregation of duties

Question 3)
Duncan and Mira both work in the data center at Triffid, Inc. There is a policy in place that requires both of them to be present in the data center at the same time; if one of them has to leave for any reason, the other has to step out, too, until they can both re-enter. This is called ________. (D 3, L3.1.1)

  • Blockade
  • Multifactor authentication
  • Two-person integrity
  • Defense in depth

Question 4)
Clyde is the security analyst tasked with finding an appropriate physical control to reduce the possibility that unbadged people will follow badged employees through the entrance of the organization’s facility. Which of the following can address this risk? (D3, L3.2.1)

  • Fences
  • Dogs
  • Bollards
  • Turnstiles

Question 5)
Sinka is considering a physical deterrent control to dissuade unauthorized people from entering the organization’s property. Which of the following would serve this purpose? (D3, L3.2.1)

  • A Wall
  • Razor tape
  • A sign
  • A hidden camera

 

Also Check Out:  Incident Response, Business Continuity & Disaster Recovery Concepts Quiz Answers

 

Question 6)
Which of these combinations of physical security controls share a single point of failure? (D3, L3.2.1)

  • Guards and fences
  • Badge readers and walls
  • Dogs and bollards
  • High-illumination lighting and cameras

Question 7)
Lakshmi presents a userid and a password to a system in order to log on. Which of the following characteristics must the userid  have? (D3, L3.3.1)

  • Confidential
  • Complex
  • Unique
  • Long

Question 8)
Lakshmi presents a userid and a password to a system in order to log on. Which of the following characteristics must the password have? (D3, L3.3.1)

  • Confidential
  • Unique
  • Mathematical
  • Shared

Question 9)
Derrick logs on to a system in order to read a file. In this example, Derrick is the ______. (D3, L3.3.1)

  • Subject
  • Object
  • Process
  • Predicate

Question 10)
Which is a physical control that prevents “piggybacking” or “tailgating”; that is, an unauthorized person following an authorized person into a controlled area? (D3, L3.2.1)

  • Bollard
  • Turnstile
  • Fence
  • Wall