nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #314

CERTIFIED-IN-CYBERSECURITY Question #314: Real Exam Question with Answer & Explanation

The correct answer is A: Inconsistent control. The primary problem typically associated with decentralized access control is inconsistent control. Decentralized access control means that access permissions and management are scattered across different departments or systems within an organization. The result of this dispersio

Access Controls Concepts

Question

What is the primary problem typically associated with decentralized access control? ()

Options

  • AInconsistent control
  • BControl is excessively detailed
  • CTraining expenses are elevated
  • DPotential for access interruptions

Explanation

The primary problem typically associated with decentralized access control is inconsistent control. Decentralized access control means that access permissions and management are scattered across different departments or systems within an organization. The result of this dispersion can be varying levels of security, inconsistent access rights, and difficulty maintaining a consistent access control policy. For example, Department A may have strict access controls, while Department B may have lax controls, creating a potential security risk. These inconsistencies can lead to unauthorized access, security breaches, and difficulties in auditing and monitoring access activities. Inconsistent access control can lead to unauthorized access, security breaches, and difficulty in auditing and monitoring access activities. The remaining options are not primary problems associated with distributed access control. Potential for access disruptions refers to the risk of access being disrupted due to a system or network failure. Control is too detailed refers to the risk of having too many access control rules that can be difficult to manage. Increased training costs refers to the cost of training users on the access control system.

Topics

#Access Control#Decentralized Access Control#Security Architecture#Access Control Issues

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions