A security control should
A security control should
What set of principles is the basis for information systems controls?
What set of principles is the basis for information systems controls?
what control?
An audit trail is a category of what control?
what control?
An IDS is a category of what control?
which pairing?
Technical controls such as encryption and access control can be built into the operating system,
be software applications, or can be supplemental hardware/software units. Such controls, also
known as logical controls, represent which pairing?
Which one of the following can be identified when exceptions occur using operations security detective control
Which one of the following can be identified when exceptions occur using operations security
detective controls?
Which of the following is not an example of an operation control?
Which of the following is not an example of an operation control?
Which of the following is not an example of an operational control?
Which of the following is not an example of an operational control?
which of the following aspects of a system?
Access control allows you to exercise directing influence over which of the following aspects of a
system?
____________ is the means by which the ability to do something with a computer resource is explicitly enabled
____________ is the means by which the ability to do something with a computer resource is
explicitly enabled or restricted.