Decoded: The Cybersecurity Podcast

ISC2 CC Domain 3: Access Control Study Exam Questions by Edward Henriquez


Listen Later

Domain 3: Access Control Concepts


​ Example of logical access control:

A. Security guards

B. Biometric authentication

C. Passwords

D. Fire alarms

Answer: C


​ Multi-factor authentication (MFA) requires:

A. Two or more forms of authentication from different categories

B. The same password used in multiple places

C. Multiple users authenticating simultaneously

D. A combination of encryption methods

Answer: A


​ Access control based on job roles:

A. Discretionary Access Control (DAC)

B. Role-Based Access Control (RBAC)

C. Attribute-Based Access Control (ABAC)

D. Mandatory Access Control (MAC)

Answer: B


​ Access control granting permissions based on attributes like location:

A. Attribute-Based Access Control (ABAC)

B. Role-Based Access Control (RBAC)

C. Mandatory Access Control (MAC)

D. Discretionary Access Control (DAC)

Answer: A


​ Access control using predefined rules/labels:

A. Discretionary Access Control (DAC)

B. Role-Based Access Control (RBAC)

C. Mandatory Access Control (MAC)

D. Attribute-Based Access Control (ABAC)

Answer: C


​ Principle of least privilege:

A. Giving users only necessary permissions

B. Allowing administrators unlimited access

C. Preventing user account creation

D. Implementing mandatory security clearances

Answer: A


​ Time-based access control:

A. Granted only during specific hours

B. Determined by user role

C. Restricted to known locations

D. Granted after authentication expires

Answer: A


​ Centralized server enforcing access control policies:

A. Firewall

B. Directory Service

C. Proxy Server

D. Load Balancer

Answer: B


​ Attack using stolen session token:

A. Brute force

B. Replay attack

C. Session hijacking

D. Phishing

Answer: C


​ Access control model where users can grant/restrict access:

A. Discretionary Access Control (DAC)

B. Mandatory Access Control (MAC)

C. Role-Based Access Control (RBAC)

D. Attribute-Based Access Control (ABAC)

Answer: A


​ Purpose of a password policy:

A. Encrypt files

B. Enforce secure password creation/management

C. Monitor login attempts

D. Limit account creation

Answer: B


​ “Something you have” in MFA:

A. Password

B. Smart card

C. Biometrics

D. PIN

Answer: B


​ Risk of sharing user credentials:

A. Loss of password integrity

B. Violation of encryption standards

C. Increased bandwidth usage

D. Unauthorized access

Answer: D


​ Purpose of account lockout policies:

A. Block malicious traffic

B. Prevent brute force attacks

C. Encrypt sensitive data

D. Monitor login attempts

Answer: B


​ Access control dynamically adjusting access by location:

A. Attribute-Based Access Control (ABAC)

B. Role-Based Access Control (RBAC)

C. Mandatory Access Control (MAC)

D. Discretionary Access Control (DAC)

Answer: A


​ Primary purpose of biometric authentication:

A. Enhance encryption

B. Verify physical characteristics

C. Monitor network traffic

D. Backup critical data

Answer: B


​ Granting temporary access:

A. Privilege escalation

B. Time-bound access

C. User provisioning

D. Conditional access

Answer: B


​ Attack manipulating users to share confidential data:

A. Malware

B. Social engineering

C. Phishing

D. Keylogging

Answer: B


​ Preventing password reuse:

A. Multi-factor authentication

B. Password history policies

C. Single sign-on

D. Encryption

Answer: B


​ Primary function of access control logs:

A. Block unauthorized users

B. Record access attempts

C. Update user roles

D. Enforce encryption

Answer: B


​ Purpose of a firewall:

A. Detect malware

B. Filter traffic between networks

C. Encrypt sensitive information

D. Manage bandwidth

Answer: B


​ Attack flooding a network to disrupt resources:

A. Man-in-the-middle

B. Phishing

C. Denial of Service (DoS)

D. Replay

Answer: C

...more
View all episodesView all episodes
Download on the App Store

Decoded: The Cybersecurity PodcastBy Edward Henriquez

  • 4.8
  • 4.8
  • 4.8
  • 4.8
  • 4.8

4.8

4 ratings


More shows like Decoded: The Cybersecurity Podcast

View all
Up First from NPR by NPR

Up First from NPR

56,391 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,010 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

175 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

134 Listeners

David Bombal by David Bombal

David Bombal

25 Listeners