Procedures that ensure that the access control mechanisms correctly implement the security policy for the entire life cycle of an information system are known as:

Procedures that ensure that the access control mechanisms correctly implement the security policy
for the entire life cycle of an information system are known as:

Procedures that ensure that the access control mechanisms correctly implement the security policy
for the entire life cycle of an information system are known as:

A.
Accountability procedures.

B.
Authentication procedures.

C.
Assurance procedures.

D.
Trustworthy procedures.

Explanation:
The correct answer is “Assurance procedures”. Accountability, answer a, refers to the ability to
determine the actions and behaviors of a single individual within a system and to identify that
individual. Answer “Authentication procedures” involves testing or reconciling of evidence of a user’s
identity in order to establish that identity. Answer “Trustworthy procedures” is a distracter.



Leave a Reply 0

Your email address will not be published. Required fields are marked *

five + nineteen =