Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 242 discussion

Actual exam question from ISC's CISSP
Question #: 242
Topic #: 1
[All CISSP Questions]

What are the first two components of logical access control?

  • A. Authentication and availability
  • B. Authentication and identification
  • C. Identification and confidentiality
  • D. Confidentiality and authentication
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
BP_lobster
Highly Voted 2 years ago
Selected Answer: B
Remember IAAA from the CISSP study guide. Identification Authentication Authorization and Accountability
upvoted 5 times
...
Woo7
Most Recent 9 months, 3 weeks ago
Selected Answer: D
pg 640 in the OSG "Logical access controls are the technical controls used to protect access to information, systems, devices, and applications. They include authentication, authorization, and permissions." I would say that is confidentiality and authorization
upvoted 1 times
...
[Removed]
1 year, 1 month ago
Selected Answer: B
B is correct
upvoted 1 times
...
74gjd_37
1 year, 2 months ago
Selected Answer: B
The answer is B. Authentication and identification are the first two components of logical access control. Authentication is the process of verifying a user's identity, while identification is the process of identifying the user requesting access. In the context of logical access control, identification precedes authentication. Identification is the process of identifying a user or entity seeking access to a system or resource. Once the user or entity has been identified, the authentication process begins to verify the user's identity and ensure that they have the necessary permissions to access the system or resource. So, the correct order is identification followed by authentication. But this is still option B.
upvoted 1 times
...
DJOEK
1 year, 10 months ago
Selected Answer: B
first Identification, then authentication, then Authorization, then Accountability
upvoted 3 times
jackdryan
1 year, 6 months ago
B is correct
upvoted 1 times
...
...
rajkamal0
1 year, 11 months ago
Selected Answer: B
B is the best answer.
upvoted 1 times
...
Delab202
1 year, 11 months ago
Selected Answer: B
Logical access in IT is often defined as interactions with hardware through remote access. This type of access generally features identification, authentication and authorization protocols. This is often contrasted with the term "physical access," which refers to interactions with hardware in the physical environment, where equipment is stored and used.
upvoted 1 times
...
franbarpro
2 years, 1 month ago
Before we can implement access control. First we have to identify who you are....... and then challenge that identify by authenticating you. Think about Username (Identity) + Password (Athentification).
upvoted 4 times
...
The_Black_One
2 years, 1 month ago
Selected Answer: B
Definitely B
upvoted 2 times
...
byolar
2 years, 1 month ago
The answer should be - B
upvoted 2 times
...
BDSec
2 years, 2 months ago
Selected Answer: B
Yes it is B
upvoted 3 times
...
inmymind84
2 years, 2 months ago
Selected Answer: B
it is B
upvoted 3 times
...
Yanjun
2 years, 2 months ago
clearly it should be B
upvoted 2 times
...
stickerbush1970
2 years, 2 months ago
Selected Answer: B
Should be B
upvoted 3 times
...
ygc
2 years, 2 months ago
Agree with B
upvoted 4 times
...
jon1991
2 years, 2 months ago
The answer to this should be - B
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...