Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

IFMA CFM Exam - Topic 10 Question 7 Discussion

Actual exam question for IFMA's CFM exam
Question #: 7
Topic #: 10
[All CFM Questions]

What is a technical measure that prevents unauthorized people from gaining access to a facility work order system?

Show Suggested Answer Hide Answer
Suggested Answer: A

The best security practice to prevent unauthorized access is Identification and Authentication. This process ensures that only authorized personnel can access a facility's work order system by:

Using secure logins (e.g., username/password, biometrics, multi-factor authentication).

Verifying user identities before granting system access.

Implementing role-based permissions to control system functions per user authorization level.

While data encryption (Option B) secures stored data, it does not control system access. Similarly, a proprietary user interface (Option C) is not a security measure on its own, and an HR employee database (Option D) is unrelated to system security.


Contribute your Thoughts:

0/2000 characters
Selene
4 months ago
Totally agree with ID and auth!
upvoted 0 times
...
Callie
4 months ago
Wait, proprietary user interface? That doesn't sound right.
upvoted 0 times
...
Herschel
4 months ago
Identification and authentication is key!
upvoted 0 times
...
Lore
4 months ago
Human resource database? That's not a security measure!
upvoted 0 times
...
Maynard
4 months ago
I think data encryption is more important.
upvoted 0 times
...
Verlene
5 months ago
I’m confused; could a proprietary user interface also help with access? It seems like it might, but I’m not confident.
upvoted 0 times
...
Maryann
5 months ago
I feel like I've seen a similar question before, and identification and authentication stood out as the key measure for preventing unauthorized access.
upvoted 0 times
...
Buffy
5 months ago
I'm not entirely sure, but I remember something about data encryption being more about protecting data rather than access control.
upvoted 0 times
...
Donette
5 months ago
I think identification and authentication is the right answer since it directly relates to controlling access.
upvoted 0 times
...
Niesha
5 months ago
A proprietary user interface might add an extra layer of security, but I don't think that's the primary technical measure they're looking for. I'll have to consider the other options.
upvoted 0 times
...
Crista
6 months ago
Data encryption is important, but I don't think that's the best answer here. I'll have to re-read the question.
upvoted 0 times
...
Pa
6 months ago
Identification and authentication is the key to preventing unauthorized access, so I'm going with option A.
upvoted 0 times
...
Ettie
6 months ago
Hmm, I'm not sure about this one. I'll have to think it through carefully.
upvoted 0 times
...
Dominga
6 months ago
This seems like a straightforward security question. I'm pretty confident I know the answer.
upvoted 0 times
...
Hillary
12 months ago
C seems a bit outdated. A proprietary user interface? In this day and age, I'd go with the more robust solution of A.
upvoted 0 times
Katie
11 months ago
I think data encryption is also important for added security.
upvoted 0 times
...
...
Veronica
1 year ago
Haha, D is a funny one. Protecting the work orders with the HR database? That's a new one!
upvoted 0 times
...
Shayne
1 year ago
I think C) Proprietary user interface could also be effective, as it limits access to only approved users.
upvoted 0 times
...
Idella
1 year ago
B is also a good option. Encrypting the data would add an extra layer of protection.
upvoted 0 times
Isadora
10 months ago
B is also a good option. Encrypting the data would add an extra layer of protection.
upvoted 0 times
...
Kandis
10 months ago
B) Data encryption.
upvoted 0 times
...
Ben
10 months ago
A) Identification and authentication.
upvoted 0 times
...
Mattie
11 months ago
B is also a good option. Encrypting the data would add an extra layer of protection.
upvoted 0 times
...
Helene
11 months ago
B) Data encryption.
upvoted 0 times
...
Ernest
11 months ago
A) Identification and authentication.
upvoted 0 times
...
...
Rosina
1 year ago
I'm not sure, but I think B) Data encryption could also be a valid measure to prevent unauthorized access.
upvoted 0 times
...
Elza
1 year ago
I agree with Chuck, because it ensures only authorized people can access the system.
upvoted 0 times
...
Leonida
1 year ago
I agree with Cherri. A is the correct answer here. Can't have random people accessing the system, am I right?
upvoted 0 times
Lacresha
12 months ago
B) Data encryption.
upvoted 0 times
...
Teri
12 months ago
Definitely, we need to make sure only authorized personnel can access the system.
upvoted 0 times
...
Jeanice
12 months ago
A) Identification and authentication.
upvoted 0 times
...
...
Cherri
1 year ago
Definitely A. Identification and authentication is the way to go for securing access to the work order system.
upvoted 0 times
Melodie
1 year ago
B) Data encryption.
upvoted 0 times
...
Shenika
1 year ago
I agree, that's the best way to prevent unauthorized access.
upvoted 0 times
...
Janessa
1 year ago
A) Identification and authentication.
upvoted 0 times
...
...
Chuck
1 year ago
I think the answer is A) Identification and authentication.
upvoted 0 times
...

Save Cancel