exam questions

Exam CISA All Questions

View all questions & answers for the CISA exam

Exam CISA topic 1 question 1795 discussion

Actual exam question from Isaca's CISA
Question #: 1795
Topic #: 1
[All CISA Questions]

Which of the following is the MOST effective control when granting access to a service provider for a cloud-based application?

  • A. Administrator access is provided for a limited period with an expiration date.
  • B. Access has been provided on a need-to-know basis.
  • C. User IDs are deleted when work is completed.
  • D. Access is provided to correspond with the service level agreement (SLA).
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
CCNPWILL
3 days, 10 hours ago
Selected Answer: A
A. Administrator access is provided for a limited period with an expiration date. Let’s briefly break down the others: B. Access on a need-to-know basis 🔸 This is a strong principle but is more general. It doesn’t ensure time restrictions or administrative oversight, which are critical with cloud-based external access. C. User IDs are deleted when work is completed 🔸 A good clean-up control, but it’s reactive, not proactive. It still leaves a window of potential exposure until deletion occurs. D. Access aligns with SLA 🔸 Vague. SLAs usually define service performance, not granular access control. So it’s not sufficient as a security measure.
upvoted 1 times
...
46080f2
1 month, 2 weeks ago
Selected Answer: B
Given the question’s focus on "granting access," the most effective control is one that ensures access is appropriately scoped from the start. The manual’s emphasis on least privilege in Section 5.3 ("The principle of least privilege requires that users be granted only the minimum level of access necessary to perform their job functions," p. 373) and its application to third parties in Section 2.9 ("third-party access is restricted to only the systems and data necessary," p. 143) strongly supports Option B. This control minimizes risk proactively, aligning with cloud security responsibilities and vendor management best practices.
upvoted 1 times
...
blehbleh
6 months, 2 weeks ago
Selected Answer: A
I am pretty sure A is the correct answer as it has an expiration time. Option C says they are deleted when work is completed which is a good idea and should be done but when work is completed is very arbitrary. B doesn’t make a lot of sense. Access is provided on a need to know basis. I mean, duh. Right, they shouldn’t just access all the time whenever. Which is why I lean toward A. Because it has an expiration date so it doesn’t necessarily matter if the work got completed. They can get granted access again without it extending too long. Hopefully that makes sense to anyone else who is struggling with the options given.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago