A review of logical access controls is performed primarily to:

A. Ensure that organizational security policies conform to the logical access design and architecture
B. Ensure that the technical implementation of access controls is performed as intended by security administration
C. Ensure that the technical implementation of access controls is performed as intended by the data owners
D. Understand how access control has been implemented

Answer: C. Ensure that the technical implementation of access controls is performed as intended by the data owners

Business

You might also like to view...

At a price of $6 each, 314 people want to buy sun visors designed especially for volunteers at the Peachtree Road Race, and only 314 such visors were available. In this example, a state of which of the following has been achieved?

a. price equilibrium b. symmetry c. marketing balance d. commerce stability

Business

When formulating a goal programming model, the decision maker will use constraints similar to those used in regular linear or nonlinear programming models. In goal programming models, these constraints are known deviational constraints

a. True b. False

Business