Procedures that ensure that the access control mechanisms correctly implement the security policy for the entire life cycle of an information system are known as:

Procedures that ensure that the access control mechanisms correctly
implement the security policy for the entire life cycle of an information
system are known as:

Procedures that ensure that the access control mechanisms correctly
implement the security policy for the entire life cycle of an information
system are known as:

A.
Accountability procedures.

B.
Authentication procedures.

C.
Assurance procedures.

D.
Trustworthy procedures.

Explanation:
The correct answer is “Assurance procedures”.
Accountability, answer a, refers to the ability to determine the actions and behaviors of a single
individual within a system and to identify that individual. Answer “Authentication procedures”
involves testing or reconciling of evidence of a user’s identity
in order to establish that identity. Answer “Trustworthy procedures” is a distracter.



Leave a Reply 1

Your email address will not be published. Required fields are marked *

10 + 19 =