Which of the following is a technical control that helps secure information flow in an organization?
A) The information system enforces approved authorizations for access to the system.
B) The information system enforces the organization's policy about human review.
C) The information system automatically disables accounts after a time period defined by the organization.
D) The information system defines the information to be encrypted or stored offline in a secure location.
B
You might also like to view...
When would an agent not have to comply with the requirement of presenting all offers to purchase to the principal?
A. When the agent notifies the principal in writing that he will not present a particular offer B. When a new offer is substantially lower than an offer already received C. When the agent is acting under written instructions of the principal D. When the agent is acting as a gratuitous agent
__________ is a stream cipher used in the Secure Sockets Layer/Transport Layer Security standards that have been defined for communication between Web browsers and servers and is also used in WEP and WPA protocols.
What will be an ideal response?