Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CISSP Exam - Topic 3 Question 73 Discussion

Actual exam question for ISC2's CISSP exam
Question #: 73
Topic #: 3
[All CISSP Questions]

A Virtual Machine (VM) environment has five guest Operating Systems (OS) and provides strong isolation. What MUST an administrator review to audit a user's access to data files?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Chantell
5 months ago
I agree, but don’t forget about the Host VM access controls too!
upvoted 0 times
...
Kami
5 months ago
Wait, can you really trust the isolation in VMs?
upvoted 0 times
...
Crista
5 months ago
Guest OS audit logs are crucial for tracking user activity!
upvoted 0 times
...
Audra
5 months ago
I think the Host VM monitor audit logs are more important.
upvoted 0 times
...
Virgie
6 months ago
Definitely need to check the Guest OS access controls.
upvoted 0 times
...
Brianne
6 months ago
I remember the emphasis on strong isolation, so maybe the Host VM access controls are crucial too? This is tricky!
upvoted 0 times
...
Loren
6 months ago
I practiced a similar question, and I feel like the Guest OS access controls might also be relevant, but I'm not completely confident.
upvoted 0 times
...
Annice
6 months ago
I'm not so sure about that. I remember something about the host VM monitor audit logs being important for overall access tracking.
upvoted 0 times
...
Barrie
6 months ago
I think we should definitely look at the Guest OS audit logs since they would show specific user activities, right?
upvoted 0 times
...
Kelvin
6 months ago
I'm a little confused by the wording of this question. Is there a difference between a work list and a work queue? I want to make sure I understand the concepts before I decide on the best approach.
upvoted 0 times
...
Glenna
6 months ago
I'm a little confused by the wording of this question. Business-to-consumer (B2C) doesn't seem to be related to the idea of multiple distribution channels.
upvoted 0 times
...
Augustine
6 months ago
I remember reading that HINs can really improve how health plans track outcomes, so option A seems true to me.
upvoted 0 times
...
Quiana
6 months ago
I wish I had spent more time on storage networking! I can't remember if the WWPN pools are supposed to start from all zeros or if they can begin from other values like in B.
upvoted 0 times
...
Carisa
11 months ago
You know, I heard the VM admin has a secret unicorn that keeps an eye on all the guest OSes. Maybe we should ask it for the answer instead?
upvoted 0 times
...
Inocencia
11 months ago
The host VM access controls, absolutely. Trying to audit a user's access through the guest OS is like trying to herd cats. Good luck with that!
upvoted 0 times
Reiko
9 months ago
D) Guest OS audit logs
upvoted 0 times
...
Jarvis
9 months ago
C) Host VM access controls
upvoted 0 times
...
Margot
9 months ago
B) Guest OS access controls
upvoted 0 times
...
Phil
10 months ago
A) Host VM monitor audit logs
upvoted 0 times
...
...
Jodi
11 months ago
Guest OS audit logs? Really? That's like trying to find a needle in a haystack. The host VM access controls are where it's at, folks!
upvoted 0 times
Sylvie
10 months ago
C: Host VM access controls
upvoted 0 times
...
Aaron
10 months ago
B: Guest OS access controls
upvoted 0 times
...
Gwen
10 months ago
A: Host VM monitor audit logs
upvoted 0 times
...
...
Victor
1 year ago
Host VM monitor audit logs? Nah, that's way too broad. Gotta focus on the access controls, that's where the juice is at.
upvoted 0 times
Celia
11 months ago
Definitely, focusing on the Guest OS audit logs will give us the most relevant information.
upvoted 0 times
...
Mary
11 months ago
Yeah, you're right. Guest OS access controls are key for auditing user access to data files.
upvoted 0 times
...
...
Becky
1 year ago
Hmm, this one's tricky. Gotta go with the host VM access controls here. Can't just look at the guest OS, that's way too limited!
upvoted 0 times
Carli
10 months ago
True, it's always good to cover all bases when auditing user access to data files.
upvoted 0 times
...
Juliann
11 months ago
I would also consider checking the guest OS audit logs just to be thorough.
upvoted 0 times
...
Caprice
11 months ago
Yeah, I agree. It's important to review the overall access controls.
upvoted 0 times
...
Margurite
12 months ago
I think the host VM access controls are the key here.
upvoted 0 times
...
...
Cathern
1 year ago
But wouldn't it also be important to review the Host VM monitor audit logs to ensure complete audit trail?
upvoted 0 times
...
Lemuel
1 year ago
I agree with Tiera, the Guest OS audit logs would show the user's access to data files.
upvoted 0 times
...
Tiera
1 year ago
I think the administrator should review the Guest OS audit logs.
upvoted 0 times
...

Save Cancel