Question: 21. Two different employees eimployee has part of the safe combination, and the second employee has the other part of are required to open a

 21. Two different employees eimployee has part of the safe combination,

21. Two different employees eimployee has part of the safe combination, and the second employee has the other part of are required to open a safe containing sensitive information. One the safe combination. A) need to know C)) separation of privilege This arrangement follows the principle of B) D) least privilege least common mechanism ich of the following terms best describes the assurance that data has not been changed unintentionally due to an accident or malice? 22. A) Utility C)) Integrity B) Availability D) Possession 23.A sender not being able to deny sending a message that he/she, in fact, did send, is message A nonrepudiation C) confidentiality A loss of B) integrity D) sending 24. is the unauthorized disclosure of information. A) authenticity C) reliability B confidentiality D) integrity Which of the following terms best describes the weakness in a system that may possibly be exploited? 25. B Vulnerability D) Risk A) Threat C) Weakest link 26. A threat can be defined as a A) informational self-determination Bset of circumstances that could cause harm or loss C) weakness that could be exploited to cause harm D) the ability to trace all actions related to a given asset 27. In the Bell-LaPadula model, the "simple security property" is also called the property no read down A) C) When an information system authenticates a user based on "what the user is", this refers to the use of A) authorization based upon the user's job title B no write down D) no write up no read up 28. B) role-based authentication C) two-factor authentication D) biometric authentication 5 of 10

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!