New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CISSP Exam - Topic 5 Question 30 Discussion

Actual exam question for ISC2's CISSP exam
Question #: 30
Topic #: 5
[All CISSP Questions]

In order to support the least privilege security principle when a resource is transferring within the organization from a production support system administration role to a developer role, what changes should be made to the resource's access to the production operating system (OS) directory structure?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Edda
4 months ago
Read Only to No Access makes sense for security.
upvoted 0 times
...
Judy
4 months ago
Isn't No Access too extreme?
upvoted 0 times
...
Ludivina
4 months ago
Wait, why would you give Author privileges?
upvoted 0 times
...
Kristel
4 months ago
Agreed, least privilege is key!
upvoted 0 times
...
Lettie
5 months ago
Definitely should go from Admin to No Access.
upvoted 0 times
...
Chu
5 months ago
I feel like option B is definitely wrong since we shouldn't be giving more access. But I'm confused about whether A or C is better.
upvoted 0 times
...
Lang
5 months ago
I'm not entirely sure, but I remember a practice question where we had to downgrade privileges. Could it be option C?
upvoted 0 times
...
Tien
5 months ago
I think the least privilege principle means we should restrict access as much as possible, so maybe option A makes sense?
upvoted 0 times
...
Delbert
5 months ago
I recall something about minimizing access, but I can't remember if "No Access" is always the right choice. This is tricky!
upvoted 0 times
...
Corinne
5 months ago
Hmm, this is a bit technical. I'll focus on the main concepts first - the water levels, alarms, and restrictions on writing/reading data. Then I'll match that up with the answer choices to identify the one that is wrong.
upvoted 0 times
...
Lashawna
5 months ago
Hmm, I'm a bit confused about the filesystem option. How would that help prevent session hijacking? I'm not sure that's the right approach here. I think I'll focus on the encryption and spoof rule options.
upvoted 0 times
...

Save Cancel