Procedures that ensure that the access control mechanisms correctly implement the security policy
for the entire life cycle of an information system are known as:

A.
Accountability procedures.
B.
Authentication procedures.
C.
Assurance procedures.
D.
Trustworthy procedures.
Explanation:
The correct answer is “Assurance procedures”. Accountability, answer a, refers to the ability to
determine the actions and behaviors of a single individual within a system and to identify that
individual. Answer “Authentication procedures” involves testing or reconciling of evidence of a user’s
identity in order to establish that identity. Answer “Trustworthy procedures” is a distracter.