(ISC)2 Certified in Cybersecurity Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the (ISC)2 Certified in Cybersecurity Exam with comprehensive quizzes and extensive question banks. Enhance your skills with detailed explanations and practice tests designed to improve your expertise for the certification exam. Get exam-ready now!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which of the following systems requires an individual's identity to be validated to access resources?

  1. Firewall

  2. Intrusion Detection System

  3. Logical Access Control Systems

  4. Virtual Private Network

The correct answer is: Logical Access Control Systems

A logical access control system is designed to restrict access to resources based on the identity of users. This system implements various methods of authentication to ensure that only authorized individuals can access sensitive information and critical systems. It supports mechanisms such as usernames and passwords, biometric scans, or security tokens, which validate an individual's identity before granting access. By managing permissions and access rights, logical access control systems help maintain security and protect digital assets from unauthorized access. In contrast, firewalls primarily serve to control incoming and outgoing network traffic based on predetermined security rules but do not inherently validate individual identities. Intrusion Detection Systems monitor network traffic for suspicious activity or policy violations but also do not typically involve identity verification. Virtual Private Networks (VPNs) provide secure connections to remote users but focus more on encrypting data in transit rather than validating individual identities as the primary function.