Procedures that ensure that the access control mechanisms correctly
implement the security policy for the entire life cycle of an information
system are known as:

A.
Accountability procedures.
B.
Authentication procedures.
C.
Assurance procedures.
D.
Trustworthy procedures.
Explanation:
The correct answer is “Assurance procedures”.
Accountability, answer a, refers to the ability to determine the actions and behaviors of a single
individual within a system and to identify that individual. Answer “Authentication procedures”
involves testing or reconciling of evidence of a user’s identity
in order to establish that identity. Answer “Trustworthy procedures” is a distracter.
c
0
0