Technical controls ____.
A) must be implemented using access control list
B) must be implemented using configuration rules
C) must be implemented using user profiles
D) can be implemented using access control lists or configuration rules
Correct Answer:
Verified
Q57: Policy servers code organization-specific policies in a
Q58: An effective issue-specific security policy serves to
Q59: It is during the design phase of
Q60: Which of the following is NOT a
Q61: A disadvantage of creating a modular ISSP
Q63: A _ is a more detailed statement
Q64: Which of the following is a type
Q65: A(n)_ security policy provides detailed,targeted guidance to
Q66: A disadvantage of creating a number of
Q67: The _ section of the ISSP should
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents