nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #359

CERTIFIED-IN-CYBERSECURITY Question #359: Real Exam Question with Answer & Explanation

The correct answer is C: Authentication. Authentication is the process of verifying the identity of a user, device, or system before granting access to information systems and data. Authentication is an important part of logical access control, as it ensures that only authorized users can access a system or data. Other

Access Controls Concepts

Question

Which of the following is a logical access control method that verifies the identity of a user before granting access to a system?

Options

  • AEncryption
  • BFirewall
  • CAuthentication
  • DIntrusion detection system

Explanation

Authentication is the process of verifying the identity of a user, device, or system before granting access to information systems and data. Authentication is an important part of logical access control, as it ensures that only authorized users can access a system or data. Other options are related to securing data and networks but do not specifically verify user identity for access control purposes. Encryption protects data confidentiality, firewalls control traffic between networks, and intrusion detection systems monitor networks for malicious activity.

Topics

#Authentication#Access Control#Identity Verification#Logical Security

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions