CAMS Practice Test Thank you for taking the Certified Access Management Specialist (CAMS) practice exam. Professionals who have hands-on responsibility for managing access requests and ensuing that system access is appropriate within their organizations should consider the comprehensive CAMS training and certification to be recognized as an expert in the fastest growing segment of cyber security. These 10 practice questions should give you an idea about the final online exam which includes 100 similar multiple choice questions. Your test score and the correct answers to these questions will be e-mailed to you shortly after you submit the practice test. Press Next to get started 1. On what three principles should access control be based? a) Least privilege, separation of duties and need to know b) Separation of duties, role within a company and administrative permissions c) Need to know, activities within a system and least privilege2. What is an endpoint? a) A type of malicious attack b) Any device with the capabilities to connect to an internal network c) A security program used to protect against data theft3. Why is security information and event management (SIEM) essential for data security? a) It ensures compliance b) It allows for earlier detection of suspicious activity c) It prevents unauthorized access4. What do the rows and columns in an access control matrix represent? a) Subjects and objects b) Objects and rights c) Permissions and users5. What type of access control is currently most popular for businesses? a) Role-based b) Identity-based c) Discretionary6. What are the three pillars of the CIA triad? a) Confidentiality, integrity and authorization b) Confidentiality, integrity and availability c) Confidentiality, identification and availability7. What are the consequences for companies failing to comply with security regulations? a) Time lost cleaning up after data breaches b) Fines and penalties c) Revocation of business license8. How is authentication best defined? a) The way a system recognizes a user b) The use of multiple factors to prove identity c) The process of proving a user is who he or she claims to be9. What is one major reason why companies should conduct access audits? a) To avoid fines for noncompliance b) To identify potential problems with internal access procedures c) To ensure cybersecurity platforms are in working order10. The process allowing authenticated users to access specific information is called what? a) Authorization b) Integrity c) IdentificationPlease enter your name, email address and press Submit Quiz. If you receive an error message, press Previous to go back and answer all questions. The results will appear after you submit. Name Email Time is Up!