ISC2 CISSP Practice Question

A large enterprise is deploying a new cloud-based IAM system. The security architect is reviewing the configuration options and notices that user accounts are initially created with full access to all system resources. What action should the security architect recommend to best implement the principle of secure defaults?

  • Leave the default configuration and train administrators to remove unnecessary permissions after account creation

  • Configure the system to create user accounts with no access by default and grant permissions based on job requirements

  • Deploy enhanced logging and monitoring to track user activities after accounts are created with full access

  • Implement role-based templates that grant moderate access to all users and additional permissions for privileged users

ISC2 CISSP
Security Architecture and Engineering
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot