Podcast
Questions and Answers
What is the technology enabling the use of virtual private networks?
What is the technology enabling the use of virtual private networks?
Which method uses data classification schemes for access control?
Which method uses data classification schemes for access control?
What is the mechanism whereby an unverified entity proposes a label for access to a resource?
What is the mechanism whereby an unverified entity proposes a label for access to a resource?
What type of access control is a strictly-enforced version of MACs managed by a central authority?
What type of access control is a strictly-enforced version of MACs managed by a central authority?
Signup and view all the answers
What improves an organization’s ability to balance making information readily available against increasing information’s levels of confidentiality and integrity?
What improves an organization’s ability to balance making information readily available against increasing information’s levels of confidentiality and integrity?
Signup and view all the answers
What type of controls are essential in enforcing policy for many IT functions that do not involve direct human control?
What type of controls are essential in enforcing policy for many IT functions that do not involve direct human control?
Signup and view all the answers
What type of access control is implemented at the discretion or option of the data user?
What type of access control is implemented at the discretion or option of the data user?
Signup and view all the answers
What is the mechanism by which an unverified entity seeking access to a resource proposes a label by which they are known to the system?
What is the mechanism by which an unverified entity seeking access to a resource proposes a label by which they are known to the system?
Signup and view all the answers
What type of access control uses data classification schemes?
What type of access control uses data classification schemes?
Signup and view all the answers
What improves an organization’s ability to balance making information readily available against increasing information’s levels of confidentiality and integrity?
What improves an organization’s ability to balance making information readily available against increasing information’s levels of confidentiality and integrity?
Signup and view all the answers
What type of access control is a strictly-enforced version of MACs that are managed by a central authority?
What type of access control is a strictly-enforced version of MACs that are managed by a central authority?
Signup and view all the answers
What is the mechanism by which an unverified entity seeking access to a resource proposes a label by which they are known to the system?
What is the mechanism by which an unverified entity seeking access to a resource proposes a label by which they are known to the system?
Signup and view all the answers
Which technology enables the use of virtual private networks?
Which technology enables the use of virtual private networks?
Signup and view all the answers
What type of controls are essential in enforcing policy for many IT functions that do not involve direct human control?
What type of controls are essential in enforcing policy for many IT functions that do not involve direct human control?
Signup and view all the answers
What improves an organization’s ability to balance making information readily available against increasing information’s levels of confidentiality and integrity?
What improves an organization’s ability to balance making information readily available against increasing information’s levels of confidentiality and integrity?
Signup and view all the answers