Question: AC . 1 . 0 0 2 Limit information system access to the types of transactions and functions that authorized users are permitted to execute.

AC.1.002 Limit information system access to the types of transactions and functions that
authorized users are permitted to execute.
AC.2.007 Employ the principle of least privilege, including for specific security functions and Level 2 privileged accounts.
AC.2.008 Use non-privileged accounts or roles when accessing nonsecurity functions.
Level 2
AC.2.009 Limit unsuccessful logon attempts.
Level 2
AC.2.010 Use session lock with pattern-hiding displays to prevent access and viewing of data
Level 2 after a period of inactivity.
AC.2.011 Authorize wireless access prior to allowing such connections.
AC.1.002 Limit information system access to the types of transactions and functions that
authorized users are permitted to execute.
AC.2.007 Employ the principle of least privilege, including for specific security functions and Level 2 privileged accounts.
AC.2.008 Use non-privileged accounts or roles when accessing nonsecurity functions.
Level 2
AC.2.009 Limit unsuccessful logon attempts.
Level 2
AC.2.010 Use session lock with pattern-hiding displays to prevent access and viewing of data
Level 2 after a period of inactivity.
AC.2.011 Authorize wireless access prior to allowing such connections.
AC.1.002 Limit information system access to the types of transactions and functions that
authorized users are permitted to execute.
AC.2.007 Employ the principle of least privilege, including for specific security functions and Level 2 privileged accounts.
AC.2.008 Use non-privileged accounts or roles when accessing nonsecurity functions.
Level 2
AC.2.009 Limit unsuccessful logon attempts.
Level 2
AC.2.010 Use session lock with pattern-hiding displays to prevent access and viewing of data
Level 2 after a period of inactivity.
AC.2.011 Authorize wireless access prior to allowing such connections. AC.3.012 Protect wireless access using authentication and encryption.
Level 3
AC.3.017 Separate the duties of individuals to reduce the risk of malevolent activity without
Level 3 collusion.
AC.3.018 Prevent non-privileged users from executing privileged functions and capture the
execution of such functions in audit logs.
AC.3.019 Terminate (automatically) user sessions after a defined condition.
AC.3.020 Control connection of mobile devices.
Level 3
AC.4.023 Control information flows between security domains on connected systems.
Level 4 AC.4.025 Periodically review and update CUI program access permissions.
Level 4
AC.5.024 Identify and mitigate risk associated with unidentified wireless access points connected to the network.
AC . 1 . 0 0 2 Limit information system access to

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!