Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 992 discussion

Actual exam question from Isaca's CISM
Question #: 992
Topic #: 1
[All CISM Questions]

For which of the following is it MOST important that system administrators be restricted to read-only access?

  • A. User access log files
  • B. Administrator user profiles
  • C. System logging options
  • D. Administrator log files
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
fac161f
2 months, 1 week ago
D. is the answer, and A is definetly not.
upvoted 1 times
...
Uncle_Lucifer
11 months, 1 week ago
Selected Answer: D
Come on folks. you don't want admin having rights/access to their own logs. Answer is D
upvoted 2 times
...
SilverFox
11 months, 4 weeks ago
Selected Answer: D
D - prevents tamper of their own files.
upvoted 2 times
...
Cyberbug2021
12 months ago
User access log files track the actions of all users who access a system, regardless of their privileges. This includes information such as the user's ID, the time of access, the resources accessed, and the actions performed. User access log files are valuable for identifying suspicious activity, auditing system usage, and troubleshooting access-related issues. Administrator log files, on the other hand, focus specifically on the actions performed by users with administrative privileges. This includes activities such as creating or modifying user accounts, configuring system settings, and installing software. Administrator log files are particularly important for maintaining the integrity of the system and investigating security incidents.
upvoted 1 times
...
Cyberbug2021
12 months ago
Selected Answer: D
The answer is D. Administrator log files. System administrators should have read-only access to administrator log files to prevent them from tampering with or modifying the logs. This is crucial for maintaining the integrity and authenticity of the logs, which are essential for forensic investigations and incident response.
upvoted 2 times
...
Cyberbug2021
12 months ago
Option Explanation A. User access log files While it's important to maintain the integrity of user access logs, system administrators typically have legitimate reasons to access and modify these logs for administrative purposes. B. Administrator user profiles Restricting system administrators to read-only access for their own user profiles can enhance security, but it's not as critical as restricting access to administrator log files. C. System logging options System administrators typically need full access to configure and manage system logging options. Restricting them to read-only access would hinder their ability to perform their duties effectively.
upvoted 2 times
...
richck102
1 year ago
Selected Answer: A
A. User access log files
upvoted 1 times
...
oluchecpoint
1 year, 1 month ago
Selected Answer: A
User access log files contain sensitive information about who accessed the system, when they accessed it, and what actions they performed. It is crucial to restrict system administrators to read-only access for user access log files to maintain security and prevent unauthorized modifications or deletions of the log data. This helps in maintaining the integrity of the log files and ensures that the records are reliable for security and auditing purposes.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...