Question: AC . 1 . 0 0 2 Limit information system access to the types of transactions and functions that authorized users are permitted to execute.
AC Limit information system access to the types of transactions and functions that
authorized users are permitted to execute.
AC Employ the principle of least privilege, including for specific security functions and Level privileged accounts.
AC Use nonprivileged accounts or roles when accessing nonsecurity functions.
Level
AC Limit unsuccessful logon attempts.
Level
AC Use session lock with patternhiding displays to prevent access and viewing of data
Level after a period of inactivity.
AC Authorize wireless access prior to allowing such connections.
AC Limit information system access to the types of transactions and functions that
authorized users are permitted to execute.
AC Employ the principle of least privilege, including for specific security functions and Level privileged accounts.
AC Use nonprivileged accounts or roles when accessing nonsecurity functions.
Level
AC Limit unsuccessful logon attempts.
Level
AC Use session lock with patternhiding displays to prevent access and viewing of data
Level after a period of inactivity.
AC Authorize wireless access prior to allowing such connections.
AC Limit information system access to the types of transactions and functions that
authorized users are permitted to execute.
AC Employ the principle of least privilege, including for specific security functions and Level privileged accounts.
AC Use nonprivileged accounts or roles when accessing nonsecurity functions.
Level
AC Limit unsuccessful logon attempts.
Level
AC Use session lock with patternhiding displays to prevent access and viewing of data
Level after a period of inactivity.
AC Authorize wireless access prior to allowing such connections. AC Protect wireless access using authentication and encryption.
Level
AC Separate the duties of individuals to reduce the risk of malevolent activity without
Level collusion.
AC Prevent nonprivileged users from executing privileged functions and capture the
execution of such functions in audit logs
AC Terminate automatically user sessions after a defined condition.
AC Control connection of mobile devices.
Level
AC Control information flows between security domains on connected systems.
Level AC Periodically review and update CUI program access permissions.
Level
AC Identify and mitigate risk associated with unidentified wireless access points connected to the network.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
