Decoded: The Cybersecurity Podcast

ISC2 CC Domain 3: Access Control Study Exam Questions by Edward Henriquez


Listen Later

Domain 3: Access Control Concepts


​ Example of logical access control:

A. Security guards

B. Biometric authentication

C. Passwords

D. Fire alarms

Answer: C


​ Multi-factor authentication (MFA) requires:

A. Two or more forms of authentication from different categories

B. The same password used in multiple places

C. Multiple users authenticating simultaneously

D. A combination of encryption methods

Answer: A


​ Access control based on job roles:

A. Discretionary Access Control (DAC)

B. Role-Based Access Control (RBAC)

C. Attribute-Based Access Control (ABAC)

D. Mandatory Access Control (MAC)

Answer: B


​ Access control granting permissions based on attributes like location:

A. Attribute-Based Access Control (ABAC)

B. Role-Based Access Control (RBAC)

C. Mandatory Access Control (MAC)

D. Discretionary Access Control (DAC)

Answer: A


​ Access control using predefined rules/labels:

A. Discretionary Access Control (DAC)

B. Role-Based Access Control (RBAC)

C. Mandatory Access Control (MAC)

D. Attribute-Based Access Control (ABAC)

Answer: C


​ Principle of least privilege:

A. Giving users only necessary permissions

B. Allowing administrators unlimited access

C. Preventing user account creation

D. Implementing mandatory security clearances

Answer: A


​ Time-based access control:

A. Granted only during specific hours

B. Determined by user role

C. Restricted to known locations

D. Granted after authentication expires

Answer: A


​ Centralized server enforcing access control policies:

A. Firewall

B. Directory Service

C. Proxy Server

D. Load Balancer

Answer: B


​ Attack using stolen session token:

A. Brute force

B. Replay attack

C. Session hijacking

D. Phishing

Answer: C


​ Access control model where users can grant/restrict access:

A. Discretionary Access Control (DAC)

B. Mandatory Access Control (MAC)

C. Role-Based Access Control (RBAC)

D. Attribute-Based Access Control (ABAC)

Answer: A


​ Purpose of a password policy:

A. Encrypt files

B. Enforce secure password creation/management

C. Monitor login attempts

D. Limit account creation

Answer: B


​ “Something you have” in MFA:

A. Password

B. Smart card

C. Biometrics

D. PIN

Answer: B


​ Risk of sharing user credentials:

A. Loss of password integrity

B. Violation of encryption standards

C. Increased bandwidth usage

D. Unauthorized access

Answer: D


​ Purpose of account lockout policies:

A. Block malicious traffic

B. Prevent brute force attacks

C. Encrypt sensitive data

D. Monitor login attempts

Answer: B


​ Access control dynamically adjusting access by location:

A. Attribute-Based Access Control (ABAC)

B. Role-Based Access Control (RBAC)

C. Mandatory Access Control (MAC)

D. Discretionary Access Control (DAC)

Answer: A


​ Primary purpose of biometric authentication:

A. Enhance encryption

B. Verify physical characteristics

C. Monitor network traffic

D. Backup critical data

Answer: B


​ Granting temporary access:

A. Privilege escalation

B. Time-bound access

C. User provisioning

D. Conditional access

Answer: B


​ Attack manipulating users to share confidential data:

A. Malware

B. Social engineering

C. Phishing

D. Keylogging

Answer: B


​ Preventing password reuse:

A. Multi-factor authentication

B. Password history policies

C. Single sign-on

D. Encryption

Answer: B


​ Primary function of access control logs:

A. Block unauthorized users

B. Record access attempts

C. Update user roles

D. Enforce encryption

Answer: B


​ Purpose of a firewall:

A. Detect malware

B. Filter traffic between networks

C. Encrypt sensitive information

D. Manage bandwidth

Answer: B


​ Attack flooding a network to disrupt resources:

A. Man-in-the-middle

B. Phishing

C. Denial of Service (DoS)

D. Replay

Answer: C

...more
View all episodesView all episodes
Download on the App Store

Decoded: The Cybersecurity PodcastBy Edward Henriquez