(ISC)2 Certified in Cybersecurity Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the (ISC)2 Certified in Cybersecurity Exam with comprehensive quizzes and extensive question banks. Enhance your skills with detailed explanations and practice tests designed to improve your expertise for the certification exam. Get exam-ready now!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What is the process called when administrators create authentication credentials and grant authorization after onboarding?

  1. Deprovisioning

  2. Provisioning

  3. Setup

  4. Installation

The correct answer is: Provisioning

The process of creating authentication credentials and granting authorization after onboarding is referred to as provisioning. This term specifically encompasses the activities associated with preparing and equipping users with the necessary permissions and access rights to systems or applications. During the provisioning process, administrators not only create user accounts and set up authentication methods (such as passwords or two-factor authentication) but also ensure that these users have the appropriate rights and privileges to perform their roles effectively. This can include assigning roles, defining what resources the user can access, and implementing any necessary controls to maintain security. This term is widely used in IT and cybersecurity contexts to represent the actions taken to set up a new user within the system, establishing their credentials and the scope of their access based on their job functions. Other terms like deprovisioning refer to the removal of access once a user no longer needs it, while setup and installation are broader terms that do not specifically focus on user access or credentials.