New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

IFMA CFM Exam - Topic 10 Question 7 Discussion

Actual exam question for IFMA's CFM exam
Question #: 7
Topic #: 10
[All CFM Questions]

What is a technical measure that prevents unauthorized people from gaining access to a facility work order system?

Show Suggested Answer Hide Answer
Suggested Answer: A

The best security practice to prevent unauthorized access is Identification and Authentication. This process ensures that only authorized personnel can access a facility's work order system by:

Using secure logins (e.g., username/password, biometrics, multi-factor authentication).

Verifying user identities before granting system access.

Implementing role-based permissions to control system functions per user authorization level.

While data encryption (Option B) secures stored data, it does not control system access. Similarly, a proprietary user interface (Option C) is not a security measure on its own, and an HR employee database (Option D) is unrelated to system security.


Contribute your Thoughts:

0/2000 characters
Selene
2 months ago
Totally agree with ID and auth!
upvoted 0 times
...
Callie
2 months ago
Wait, proprietary user interface? That doesn't sound right.
upvoted 0 times
...
Herschel
2 months ago
Identification and authentication is key!
upvoted 0 times
...
Lore
3 months ago
Human resource database? That's not a security measure!
upvoted 0 times
...
Maynard
3 months ago
I think data encryption is more important.
upvoted 0 times
...
Verlene
3 months ago
I’m confused; could a proprietary user interface also help with access? It seems like it might, but I’m not confident.
upvoted 0 times
...
Maryann
3 months ago
I feel like I've seen a similar question before, and identification and authentication stood out as the key measure for preventing unauthorized access.
upvoted 0 times
...
Buffy
4 months ago
I'm not entirely sure, but I remember something about data encryption being more about protecting data rather than access control.
upvoted 0 times
...
Donette
4 months ago
I think identification and authentication is the right answer since it directly relates to controlling access.
upvoted 0 times
...
Niesha
4 months ago
A proprietary user interface might add an extra layer of security, but I don't think that's the primary technical measure they're looking for. I'll have to consider the other options.
upvoted 0 times
...
Crista
4 months ago
Data encryption is important, but I don't think that's the best answer here. I'll have to re-read the question.
upvoted 0 times
...
Pa
4 months ago
Identification and authentication is the key to preventing unauthorized access, so I'm going with option A.
upvoted 0 times
...
Ettie
5 months ago
Hmm, I'm not sure about this one. I'll have to think it through carefully.
upvoted 0 times
...
Dominga
5 months ago
This seems like a straightforward security question. I'm pretty confident I know the answer.
upvoted 0 times
...
Hillary
10 months ago
C seems a bit outdated. A proprietary user interface? In this day and age, I'd go with the more robust solution of A.
upvoted 0 times
Katie
9 months ago
I think data encryption is also important for added security.
upvoted 0 times
...
...
Veronica
11 months ago
Haha, D is a funny one. Protecting the work orders with the HR database? That's a new one!
upvoted 0 times
...
Shayne
11 months ago
I think C) Proprietary user interface could also be effective, as it limits access to only approved users.
upvoted 0 times
...
Idella
11 months ago
B is also a good option. Encrypting the data would add an extra layer of protection.
upvoted 0 times
Isadora
9 months ago
B is also a good option. Encrypting the data would add an extra layer of protection.
upvoted 0 times
...
Kandis
9 months ago
B) Data encryption.
upvoted 0 times
...
Ben
9 months ago
A) Identification and authentication.
upvoted 0 times
...
Mattie
9 months ago
B is also a good option. Encrypting the data would add an extra layer of protection.
upvoted 0 times
...
Helene
10 months ago
B) Data encryption.
upvoted 0 times
...
Ernest
10 months ago
A) Identification and authentication.
upvoted 0 times
...
...
Rosina
11 months ago
I'm not sure, but I think B) Data encryption could also be a valid measure to prevent unauthorized access.
upvoted 0 times
...
Elza
11 months ago
I agree with Chuck, because it ensures only authorized people can access the system.
upvoted 0 times
...
Leonida
11 months ago
I agree with Cherri. A is the correct answer here. Can't have random people accessing the system, am I right?
upvoted 0 times
Lacresha
10 months ago
B) Data encryption.
upvoted 0 times
...
Teri
10 months ago
Definitely, we need to make sure only authorized personnel can access the system.
upvoted 0 times
...
Jeanice
10 months ago
A) Identification and authentication.
upvoted 0 times
...
...
Cherri
11 months ago
Definitely A. Identification and authentication is the way to go for securing access to the work order system.
upvoted 0 times
Melodie
11 months ago
B) Data encryption.
upvoted 0 times
...
Shenika
11 months ago
I agree, that's the best way to prevent unauthorized access.
upvoted 0 times
...
Janessa
11 months ago
A) Identification and authentication.
upvoted 0 times
...
...
Chuck
11 months ago
I think the answer is A) Identification and authentication.
upvoted 0 times
...

Save Cancel