Question: 1
The adoption of an enterprise-wide business continuilty program requires Which of the folllowing?
Question: 2
When conduting a security assessment of access controls , Which activity is port of the data analysis phase?
Question: 3
The core component of Role Based Access control (RBAC) must be constructed of defined data elements, Which elements are requried?
A Users, permissions, operators, and protected objects
B Users, rotes, operations, and protected objects
C Roles, accounts, permissions, and protected objects
D Roles, operations, accounts, and protected objects
Answer : B
Show Answer
Hide Answer
Question: 4
Individuls have been identified and determined as having a need-to-know for the information. Which of the following access control methods MUST include a consistent set of rules for controlling and limiting access?
Question: 5
Functional security testing is MOST critical during which phese of the system development Life Cycle (SDLC)?