New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CISSP Exam - Topic 3 Question 73 Discussion

Actual exam question for ISC2's CISSP exam
Question #: 73
Topic #: 3
[All CISSP Questions]

A Virtual Machine (VM) environment has five guest Operating Systems (OS) and provides strong isolation. What MUST an administrator review to audit a user's access to data files?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Chantell
3 months ago
I agree, but don’t forget about the Host VM access controls too!
upvoted 0 times
...
Kami
3 months ago
Wait, can you really trust the isolation in VMs?
upvoted 0 times
...
Crista
4 months ago
Guest OS audit logs are crucial for tracking user activity!
upvoted 0 times
...
Audra
4 months ago
I think the Host VM monitor audit logs are more important.
upvoted 0 times
...
Virgie
4 months ago
Definitely need to check the Guest OS access controls.
upvoted 0 times
...
Brianne
4 months ago
I remember the emphasis on strong isolation, so maybe the Host VM access controls are crucial too? This is tricky!
upvoted 0 times
...
Loren
4 months ago
I practiced a similar question, and I feel like the Guest OS access controls might also be relevant, but I'm not completely confident.
upvoted 0 times
...
Annice
5 months ago
I'm not so sure about that. I remember something about the host VM monitor audit logs being important for overall access tracking.
upvoted 0 times
...
Barrie
5 months ago
I think we should definitely look at the Guest OS audit logs since they would show specific user activities, right?
upvoted 0 times
...
Kelvin
5 months ago
I'm a little confused by the wording of this question. Is there a difference between a work list and a work queue? I want to make sure I understand the concepts before I decide on the best approach.
upvoted 0 times
...
Glenna
5 months ago
I'm a little confused by the wording of this question. Business-to-consumer (B2C) doesn't seem to be related to the idea of multiple distribution channels.
upvoted 0 times
...
Augustine
5 months ago
I remember reading that HINs can really improve how health plans track outcomes, so option A seems true to me.
upvoted 0 times
...
Quiana
5 months ago
I wish I had spent more time on storage networking! I can't remember if the WWPN pools are supposed to start from all zeros or if they can begin from other values like in B.
upvoted 0 times
...
Carisa
9 months ago
You know, I heard the VM admin has a secret unicorn that keeps an eye on all the guest OSes. Maybe we should ask it for the answer instead?
upvoted 0 times
...
Inocencia
9 months ago
The host VM access controls, absolutely. Trying to audit a user's access through the guest OS is like trying to herd cats. Good luck with that!
upvoted 0 times
Reiko
8 months ago
D) Guest OS audit logs
upvoted 0 times
...
Jarvis
8 months ago
C) Host VM access controls
upvoted 0 times
...
Margot
8 months ago
B) Guest OS access controls
upvoted 0 times
...
Phil
9 months ago
A) Host VM monitor audit logs
upvoted 0 times
...
...
Jodi
10 months ago
Guest OS audit logs? Really? That's like trying to find a needle in a haystack. The host VM access controls are where it's at, folks!
upvoted 0 times
Sylvie
8 months ago
C: Host VM access controls
upvoted 0 times
...
Aaron
8 months ago
B: Guest OS access controls
upvoted 0 times
...
Gwen
9 months ago
A: Host VM monitor audit logs
upvoted 0 times
...
...
Victor
11 months ago
Host VM monitor audit logs? Nah, that's way too broad. Gotta focus on the access controls, that's where the juice is at.
upvoted 0 times
Celia
10 months ago
Definitely, focusing on the Guest OS audit logs will give us the most relevant information.
upvoted 0 times
...
Mary
10 months ago
Yeah, you're right. Guest OS access controls are key for auditing user access to data files.
upvoted 0 times
...
...
Becky
11 months ago
Hmm, this one's tricky. Gotta go with the host VM access controls here. Can't just look at the guest OS, that's way too limited!
upvoted 0 times
Carli
9 months ago
True, it's always good to cover all bases when auditing user access to data files.
upvoted 0 times
...
Juliann
9 months ago
I would also consider checking the guest OS audit logs just to be thorough.
upvoted 0 times
...
Caprice
10 months ago
Yeah, I agree. It's important to review the overall access controls.
upvoted 0 times
...
Margurite
10 months ago
I think the host VM access controls are the key here.
upvoted 0 times
...
...
Cathern
11 months ago
But wouldn't it also be important to review the Host VM monitor audit logs to ensure complete audit trail?
upvoted 0 times
...
Lemuel
11 months ago
I agree with Tiera, the Guest OS audit logs would show the user's access to data files.
upvoted 0 times
...
Tiera
11 months ago
I think the administrator should review the Guest OS audit logs.
upvoted 0 times
...

Save Cancel