Multiple Choice
Identify the best description of an access control matrix below.
A) does not have to be updated
B) is used to implement authentication controls
C) matches the user's authentication credentials to his authorization
D) is a table specifying which portions of the system users are permitted to access
Correct Answer:

Verified
Correct Answer:
Verified
Q15: The Trust Services Framework reliability principle that
Q17: In 2007,a major U.S.financial institution hired a
Q19: The Trust Services Framework reliability principle that
Q20: The most effective method for protecting an
Q24: It was 8:03 A.M.when Jiao Jan,the Network
Q38: Identify six physical access controls.
Q39: If the time an attacker takes to
Q50: Explain social engineering.
Q77: Cloud computing is generally more secure than
Q89: Identify three ways users can be authenticated