ExamGecko
Home Home / ISC / CISSP
Question list
Search
Search

Question 264 - CISSP discussion

Report
Export

Refer to the information below to answer the question.

A large organization uses unique identifiers and requires them at the start of every system session.

Application access is based on job classification. The organization is subject to periodic independent reviews of access controls and violations. The organization uses wired and wireless networks and remote access. The organization also uses secure connections to branch offices and secure backup and recovery strategies for selected information and processes.

What MUST the access control logs contain in addition to the identifier?

A.
Time of the access
Answers
A.
Time of the access
B.
Security classification
Answers
B.
Security classification
C.
Denied access attempts
Answers
C.
Denied access attempts
D.
Associated clearance
Answers
D.
Associated clearance
Suggested answer: A
asked 18/09/2024
Dewi Fitriyani
52 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first