New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSMP Exam - Topic 4 Question 100 Discussion

Actual exam question for ISC2's ISSMP exam
Question #: 100
Topic #: 4
[All ISSMP Questions]

Which of the following types of activities can be audited for security? Each correct answer represents a complete solution. Choose three.

Show Suggested Answer Hide Answer
Suggested Answer: B, C, D

Contribute your Thoughts:

0/2000 characters
Brice
2 months ago
I agree, B and C are must-haves for audits.
upvoted 0 times
...
Maxima
2 months ago
I thought printer access was too trivial to audit.
upvoted 0 times
...
Annamaria
3 months ago
A is also a valid choice!
upvoted 0 times
...
Novella
3 months ago
Really? Can you audit data downloading? Sounds tricky.
upvoted 0 times
...
Francoise
3 months ago
Definitely B and C can be audited.
upvoted 0 times
...
Crista
3 months ago
I have a vague memory of printer access being mentioned in a similar question, but I can't recall if it's typically audited.
upvoted 0 times
...
Alease
4 months ago
Network logons and logoffs seem like a clear choice for auditing. I remember studying that in relation to security best practices.
upvoted 0 times
...
Linette
4 months ago
I'm not entirely sure about data downloading from the Internet. I feel like it could be relevant, but it might not be as straightforward to audit.
upvoted 0 times
...
Mammie
4 months ago
I think file and object access is definitely one of the activities we can audit. It seems like a common practice question.
upvoted 0 times
...
Stanford
4 months ago
I'm a little confused by the wording of this question. Are we supposed to choose three activities that can be audited, or is there some other criteria I'm missing? I'll have to read it over again to make sure I understand.
upvoted 0 times
...
Gary
4 months ago
Okay, I've got this. Data downloading, file/object access, and network logons/logoffs are all great examples of activities that can be audited for security purposes. I'm feeling good about this one.
upvoted 0 times
...
Simona
5 months ago
Hmm, I'm a bit unsure about this one. I know security auditing is important, but I'm not sure I can confidently identify all the correct activities. I'll have to think it through carefully.
upvoted 0 times
...
Deandrea
5 months ago
This looks like a pretty straightforward security audit question. I'll need to think through the different types of activities that could be audited for security purposes.
upvoted 0 times
...
Glen
8 months ago
I'm not sure about A, but I definitely think B, C, and D are the correct types of activities that can be audited for security.
upvoted 0 times
...
Blossom
8 months ago
I think all the options are important, but B, C, and D are the ones that really matter. Gotta keep an eye on those pesky network activities and printer shenanigans!
upvoted 0 times
Thaddeus
7 months ago
Printer access may seem harmless, but it can be a vulnerability if not monitored closely.
upvoted 0 times
...
Janine
7 months ago
Network logons and logoffs can definitely give insight into potential security breaches.
upvoted 0 times
...
Paola
7 months ago
I agree, monitoring file and object access is crucial for security.
upvoted 0 times
...
...
Aliza
8 months ago
I agree with Irma. File and object access, network logons and logoffs, and printer access are all important for security auditing.
upvoted 0 times
...
Irma
8 months ago
I think B, C, and D can be audited for security.
upvoted 0 times
...
Hyun
8 months ago
I agree with Junita. Auditing network logons and logoffs, as well as printer and file access, are crucial for security. Who doesn't love a good printer audit, am I right?
upvoted 0 times
...
Junita
9 months ago
B, C, and D are definitely the right choices. You can't audit data downloading from the internet - that's just too much data to keep track of!
upvoted 0 times
Hobert
7 months ago
It's important to monitor file and object access, network logons and logoffs, and printer access for security purposes.
upvoted 0 times
...
Paris
8 months ago
Data downloading from the internet is too vast to audit, so it's not a good choice.
upvoted 0 times
...
Carmelina
8 months ago
I agree, B, C, and D are the correct choices for auditing security activities.
upvoted 0 times
...
...

Save Cancel