Multiple Choice
A systems administrator recently joined an organization and has been asked to perform a security assessment of controls on the organization's file servers, which contain client data from a number of sensitive systems. The administrator needs to compare documented access requirements to the access implemented within the file system. Which of the following is MOST likely to be reviewed during the assessment? (Choose two.)
A) Access control list
B) Security requirements traceability matrix
C) Data owner matrix
D) Roles matrix
E) Data design document
F) Data access policies
Correct Answer:

Verified
Correct Answer:
Verified
Q97: A recent overview of the network's security
Q98: A cybersecurity consulting company supports a diverse
Q99: A security architect is determining the best
Q100: A security consultant is improving the physical
Q101: During a security assessment, activities were divided
Q103: A medical facility wants to purchase mobile
Q104: A secure facility has a server room
Q105: A security researcher is gathering information about
Q106: A company has gone through a round
Q107: A penetration tester has been contracted to