nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #752

CERTIFIED-IN-CYBERSECURITY Question #752: Real Exam Question with Answer & Explanation

The correct answer is C: A set of guidelines and procedures for managing access to resources and data. An access control policy is a set of guidelines and procedures for managing access to resources and data, used to ensure that access is granted only to authorized users and that security is

Access Controls Concepts

Question

What is access control policy?

Options

  • AA list of network devices and their configurations
  • BA list of resources and their security requirements
  • CA set of guidelines and procedures for managing access to resources and data
  • DA list of authorized users and their privileges

Explanation

An access control policy is a set of guidelines and procedures for managing access to resources and data, used to ensure that access is granted only to authorized users and that security is

Topics

#Access Control#Security Policy#Cybersecurity Fundamentals

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions