List of questions
Related questions
Question 264 - CISSP discussion
Refer to the information below to answer the question.
A large organization uses unique identifiers and requires them at the start of every system session.
Application access is based on job classification. The organization is subject to periodic independent reviews of access controls and violations. The organization uses wired and wireless networks and remote access. The organization also uses secure connections to branch offices and secure backup and recovery strategies for selected information and processes.
What MUST the access control logs contain in addition to the identifier?
A.
Time of the access
B.
Security classification
C.
Denied access attempts
D.
Associated clearance
Your answer:
0 comments
Sorted by
Leave a comment first