Question: Match the protection type to its appropriate description. Answer options may be used more than once or not at all. Systems will enforce file permissions

Match the protection type to its appropriate description. Answer options may be used more than once or not at all. Systems will enforce file permissions File access is determined by ACL System authentication is provided by LDAP System can only be accessed at certain times Passwords shall expire every 90 days Mechanism Policy Which principle is supported when a backup operator can only access commands related to mounting backup tapes and backing up files onto those tapes? Auxiliary rights Least privilege Domain of protection Access matrix What is theft of service? O Unauthorized access restriction to resources o Unauthorized modification of data o Unauthorized reading of data Unauthorized use of resources Match the security level to its security concern. Answer options may be used more than once or not at all. Human Physical Operating system Network Ensures data integrity Ensures hardware integrity Prevents intercepting data Prevents social engineering What describes how an acyclic graph directory works? Users have their own file directories, and a separate master file directory keeps track of each user's directory. All files are contained in the same directory, with each file having a unique name and the ability to support many files and users. It allows multiple directories to contain the same file by using links, and updates can be viewed by all directories containing the file. Files can be shared in more than one directory in the file system, and updates to the files can be immediately viewed by other users
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
