Multiple Choice
Configuration codes entered into security systems to guide the execution of the system when information is passing through it are called ____.
A) access control lists
B) user profiles
C) configuration rules
D) capability table
Correct Answer:

Verified
Correct Answer:
Verified
Q77: For most corporate documents,a score of _
Q78: A(n)<u>technical specifications</u> SysSP document is created by
Q79: An automated policy management system is able
Q80: SysSPs often function as standards or procedures
Q81: In order to avoid reprisal or retaliation
Q83: A disadvantage of creating a number of
Q84: <u>Granularity</u> is the level of specificity and
Q85: The policy administrator must be technically oriented.
Q86: The ISSP sections Authorized Access and Usage
Q87: A(n)standard is a more detailed statement of