nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #448

CERTIFIED-IN-CYBERSECURITY Question #448: Real Exam Question with Answer & Explanation

The correct answer is A: Compares the individual's badge against a verified database. A common method for an access control system to authenticate an individual is to compare the individual's credential to a verified database. In this process, the information on the badge (such as a unique identifier) is checked against a database of authorized individuals (see th

Access Controls Concepts

Question

What is a common method for an access control system to authenticate an individual?

Options

  • ACompares the individual's badge against a verified database
  • BCompares the individual's previous and current access times
  • CCompares the individual's clothing against a dress code

Explanation

A common method for an access control system to authenticate an individual is to compare the individual's credential to a verified database. In this process, the information on the badge (such as a unique identifier) is checked against a database of authorized individuals (see the ISC2 Study Guide, Chapter 3, Module 2). For example, an employee might swipe his or her badge at a card reader to gain access to a secure area. The access control system would compare the information on the badge to the database. The system would grant access if the badge is valid and the employee is authorized to enter the area. The other options are incorrect because comparing the individual's clothing to a dress code is not a reliable method of authentication, nor is comparing the individual's previous and current access times. Finally, comparing the individual's biometric data to others in the area is not a common method of authentication and could result in false positives or negatives.

Topics

#Access Control#Authentication#Physical Security#Credentials

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions