nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #412

CERTIFIED-IN-CYBERSECURITY Question #412: Real Exam Question with Answer & Explanation

The correct answer is C: The attempt is logged, and the user is blocked. If someone tries to access a database without permission and is discovered, the typical response is to log the attempt and block the user. This is standard cybersecurity practice to prevent unauthorized access and potential data breaches. Another possible course of action is to r

Incident Response Concepts

Question

What is the typical response when someone is detected trying to access a database without permission?

Options

  • AThe user is given a warning
  • BThe user's account is deleted
  • CThe attempt is logged, and the user is blocked
  • DThe user is promoted to a higher access level

Explanation

If someone tries to access a database without permission and is discovered, the typical response is to log the attempt and block the user. This is standard cybersecurity practice to prevent unauthorized access and potential data breaches. Another possible course of action is to record the incident and alert the appropriate people to take action (this could include reviewing the incident and possibly blocking the user) (see ISC2 Study Guide Chapter 3, Module 1). For example, if an employee attempted to access a restricted database, the system would record the user's ID, the time of the attempt, and the data they attempted to access. The system would then block the user's access, either temporarily or permanently, depending on the severity of the violation. The remaining options are not typical responses to unauthorized access attempts. Deleting the user's account is usually an extreme measure and not a typical first response. It could also interfere with legitimate activities if the user has other authorized roles within the system. Issuing a warning may be part of the response, but it will not prevent further attempts. It's also important to investigate the incident to understand why it happened and how it can be prevented in the future. Finally, promoting the user to a higher access level would increase the security risk. This goes against the principle of least privilege, which states that users should have the minimum level of access necessary to perform their job.

Topics

#Incident Response#Access Control#Security Logging#Threat Mitigation

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions