Access Control Concepts Module 6 Controls Quiz Answers
In this blog post, we provide the answers to the quiz for the ISC2 course “Access Control Concepts.” Specifically, we cover the Module 6 Controls Quiz Answers to help learners reinforce their knowledge of important access control concepts. This resource is designed to assist with exam preparation and practical applications in cybersecurity and related fields.
Access Control Concepts
Module 6 Controls Quiz Answers
Controls Quiz Answers
Question 1)
Which of the following is a subject? (D 3, L3.1.1)
- A file
- A fence
- A filename
- A user
Question 2)
Lia works in the security office. During research, Lia learns that a configuration change could better protect the organization’s IT environment. Lia makes a proposal for this change, but the change cannot be implemented until it is approved, tested, and then cleared for deployment by the Change Control Board. This is an example of __________. (D3, L3.1.1)
- Defense in depth
- Holistic security
- Threat intelligence
- Segregation of duties
Question 3)
Duncan and Mira both work in the data center at Triffid, Inc. There is a policy in place that requires both of them to be present in the data center at the same time; if one of them has to leave for any reason, the other has to step out, too, until they can both re-enter. This is called ________. (D 3, L3.1.1)
- Blockade
- Multifactor authentication
- Two-person integrity
- Defense in depth
Question 4)
Clyde is the security analyst tasked with finding an appropriate physical control to reduce the possibility that unbadged people will follow badged employees through the entrance of the organization’s facility. Which of the following can address this risk? (D3, L3.2.1)
- Fences
- Dogs
- Bollards
- Turnstiles
Question 5)
Sinka is considering a physical deterrent control to dissuade unauthorized people from entering the organization’s property. Which of the following would serve this purpose? (D3, L3.2.1)
- A Wall
- Razor tape
- A sign
- A hidden camera
Also Check Out: Incident Response, Business Continuity & Disaster Recovery Concepts Quiz Answers
Question 6)
Which of these combinations of physical security controls share a single point of failure? (D3, L3.2.1)
- Guards and fences
- Badge readers and walls
- Dogs and bollards
- High-illumination lighting and cameras
Question 7)
Lakshmi presents a userid and a password to a system in order to log on. Which of the following characteristics must the userid have? (D3, L3.3.1)
- Confidential
- Complex
- Unique
- Long
Question 8)
Lakshmi presents a userid and a password to a system in order to log on. Which of the following characteristics must the password have? (D3, L3.3.1)
- Confidential
- Unique
- Mathematical
- Shared
Question 9)
Derrick logs on to a system in order to read a file. In this example, Derrick is the ______. (D3, L3.3.1)
- Subject
- Object
- Process
- Predicate
Question 10)
Which is a physical control that prevents “piggybacking” or “tailgating”; that is, an unauthorized person following an authorized person into a controlled area? (D3, L3.2.1)
- Bollard
- Turnstile
- Fence
- Wall