exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 242 discussion

Actual exam question from ISC's CISSP
Question #: 242
Topic #: 1
[All CISSP Questions]

What are the first two components of logical access control?

  • A. Authentication and availability
  • B. Authentication and identification
  • C. Identification and confidentiality
  • D. Confidentiality and authentication
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
BP_lobster
Highly Voted 1 year, 10 months ago
Selected Answer: B
Remember IAAA from the CISSP study guide. Identification Authentication Authorization and Accountability
upvoted 5 times
...
Woo7
Most Recent 7 months, 2 weeks ago
Selected Answer: D
pg 640 in the OSG "Logical access controls are the technical controls used to protect access to information, systems, devices, and applications. They include authentication, authorization, and permissions." I would say that is confidentiality and authorization
upvoted 1 times
...
[Removed]
11 months, 3 weeks ago
Selected Answer: B
B is correct
upvoted 1 times
...
74gjd_37
12 months ago
Selected Answer: B
The answer is B. Authentication and identification are the first two components of logical access control. Authentication is the process of verifying a user's identity, while identification is the process of identifying the user requesting access. In the context of logical access control, identification precedes authentication. Identification is the process of identifying a user or entity seeking access to a system or resource. Once the user or entity has been identified, the authentication process begins to verify the user's identity and ensure that they have the necessary permissions to access the system or resource. So, the correct order is identification followed by authentication. But this is still option B.
upvoted 1 times
...
DJOEK
1 year, 8 months ago
Selected Answer: B
first Identification, then authentication, then Authorization, then Accountability
upvoted 3 times
jackdryan
1 year, 4 months ago
B is correct
upvoted 1 times
...
...
rajkamal0
1 year, 8 months ago
Selected Answer: B
B is the best answer.
upvoted 1 times
...
Delab202
1 year, 8 months ago
Selected Answer: B
Logical access in IT is often defined as interactions with hardware through remote access. This type of access generally features identification, authentication and authorization protocols. This is often contrasted with the term "physical access," which refers to interactions with hardware in the physical environment, where equipment is stored and used.
upvoted 1 times
...
franbarpro
1 year, 11 months ago
Before we can implement access control. First we have to identify who you are....... and then challenge that identify by authenticating you. Think about Username (Identity) + Password (Athentification).
upvoted 4 times
...
The_Black_One
1 year, 11 months ago
Selected Answer: B
Definitely B
upvoted 2 times
...
byolar
1 year, 11 months ago
The answer should be - B
upvoted 2 times
...
BDSec
1 year, 12 months ago
Selected Answer: B
Yes it is B
upvoted 3 times
...
inmymind84
2 years ago
Selected Answer: B
it is B
upvoted 3 times
...
Yanjun
2 years ago
clearly it should be B
upvoted 2 times
...
stickerbush1970
2 years ago
Selected Answer: B
Should be B
upvoted 3 times
...
ygc
2 years ago
Agree with B
upvoted 4 times
...
jon1991
2 years ago
The answer to this should be - B
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago