PrepAway - Latest Free Exam Questions & Answers

The use of the proxies to protect more trusted assets from less sensitive ones is an example of which of the f

The use of the proxies to protect more trusted assets from less sensitive ones is an example of which of the following types of security services?

PrepAway - Latest Free Exam Questions & Answers

A.
Access control

B.
Boundary control

C.
Integrity

D.
Audit and monitoring

Explanation:
B: Access control services focus on the identifi cation, authentication, and authorization of subject entities (whether human or machine) as they are deployed and employed to access the organizations assets. These services are concerned with how and whether information is allowed to flow from one set of systems to another, or from one state to another. Boundary control systems are intended to enforce security zones of control by isolating entry points from one zone to another (choke points). Integrity services focus on the maintenance of high-integrity systems and data through automated checking to detect and correct corruption. Audit and monitoring services focus on the secure collection, storage, and analysis of audited events through centralized logging as well as the events themselves through intrusion detection systems (HIDS and NIDS) and similar services. Page 706.


Leave a Reply