(ISC)2 Certified in Cybersecurity Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the (ISC)2 Certified in Cybersecurity Exam with comprehensive quizzes and extensive question banks. Enhance your skills with detailed explanations and practice tests designed to improve your expertise for the certification exam. Get exam-ready now!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What is the best practice for achieving optimum security in an IT environment?

  1. Use only logical access controls

  2. Use only physical access controls

  3. Use only administrative access controls

  4. Use a blend of controls

The correct answer is: Use a blend of controls

Achieving optimum security in an IT environment requires a comprehensive approach that integrates multiple types of controls. A blend of logical, physical, and administrative access controls helps to create a layered defense strategy, often referred to as "defense in depth." Logical access controls protect the data and information systems through user authentication and authorization mechanisms, ensuring that only the right individuals have access to sensitive data. Physical access controls restrict access to facilities and hardware, protecting against unauthorized physical entry and potential tampering. Administrative access controls involve policies and procedures that govern the behavior and responsibilities of the personnel in the organization, establishing clear guidelines on how to handle sensitive information. By combining these controls, organizations can address different security threats and vulnerabilities more effectively. If one type of control is bypassed or fails, the other layers can still provide protection, thus reducing the overall risk. This holistic approach is essential in today's complex IT landscapes where threats can arise from various sources, making it crucial to implement multiple strategies to safeguard information and systems comprehensively.