An organization wishes to protect its sensitive data stored in a remote service from unauthorized access. What strategy should be implemented to effectively safeguard both the physical infrastructure and logical access controls?
Limit access based on geographic location of users.
Apply network segmentation to isolate different services from each other.
Utilize credential management tools for enhancing user authentication.
Establish comprehensive security measures for both the physical site and access control mechanisms.
A comprehensive approach that combines security of the physical environment with logical access management is essential for effective protection. This method ensures that both digital and physical threats are mitigated, reducing the risk of unauthorized access. Other options may focus too narrowly on one aspect, leaving vulnerabilities in the overall strategy.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are comprehensive security measures for physical and logical access controls?
Open an interactive chat with Bash
Why is it important to protect both physical infrastructure and logical access?
Open an interactive chat with Bash
What are some examples of logical access controls?
Open an interactive chat with Bash
ISC2 CISSP
Identity and Access Management (IAM)
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access