Worksheet..

User Generated

ezr1

Computer Science

Description

.......................................................................................................................................

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hey buddy, I am through. The attached word file contains the questions plus their correct answers. Thank you.

QUESTION 1
What supports the principle of "least privilege" by providing that only authorized individuals,
processes, or systems should have access to information on a need -to-know basis.
Deterrent controls
Confidentiality
Incident
Availability
Deterrent controls warns a would-be attacker that they should not attack. Confidentiality is when
measures are put in place to prevent sensitive information from reaching the unauthorized people,
while ensuring the authorized people get it. A security incident is a security event that compromises
the confidentiality, integrity, or availability of an information. Availability enables systems to be
always accessible to users without any interruptions. Confidentiality is when measures are put in
place to prevent sensitive information from reaching the unauthorized people, while ensuring the
authorized people get it and thus supports least privilege principle.

QUESTION 2
What procedures implemented to define the roles, responsibilities, policies, and administrative
functions needed to manage the control environment.
Integrity
Risk transfer

Compensating controls
Administrative controls
Administrative controls is the correct answer as they are used in defining the ro...


Anonymous
Very useful material for studying!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags