Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam CISSP Topic 3 Question 73 Discussion

Actual exam question for ISC2's CISSP exam
Question #: 73
Topic #: 3
[All CISSP Questions]

A Virtual Machine (VM) environment has five guest Operating Systems (OS) and provides strong isolation. What MUST an administrator review to audit a user's access to data files?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Victor
14 days ago
Host VM monitor audit logs? Nah, that's way too broad. Gotta focus on the access controls, that's where the juice is at.
upvoted 0 times
...
Becky
15 days ago
Hmm, this one's tricky. Gotta go with the host VM access controls here. Can't just look at the guest OS, that's way too limited!
upvoted 0 times
...
Cathern
17 days ago
But wouldn't it also be important to review the Host VM monitor audit logs to ensure complete audit trail?
upvoted 0 times
...
Lemuel
18 days ago
I agree with Tiera, the Guest OS audit logs would show the user's access to data files.
upvoted 0 times
...
Tiera
19 days ago
I think the administrator should review the Guest OS audit logs.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77