As your company's security practitioner, you are responsible for host, storage, network, and application integration into the secure enterprise architecture. Your company's security policy states that you must ensure that the CIA of data is ensured across its entire life cycle. Which principle will provide this functionality?

A. least privilege
B. separation of duties
C. defense in depth
D. social engineering


C
Explanation: The principle of defense in depth ensures that the CIA of data is ensured across its entire life cycle.
None of other principles provides this. Least privilege ensures that users use a regular account to preform regular day-to-day duties and an administrative account to only perform administrative duties. Separation of duties ensures that the tasks within a transaction are split between multiple personnel to prevent fraud. Social engineering is a common attack method whereby attackers attempt to trick legitimate users into divulging confidential information.

Computer Science & Information Technology

You might also like to view...

Jobs like desktop publisher, documentation specialist, and instructional designer are included in the ITAA job category of Programming/Software Engineering.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A(n) ________ can help find a record based on a value you select

A) combo box B) unbound control C) Date picker D) subform

Computer Science & Information Technology

Which of the following is TRUE of a subtitle for a table in PowerPoint?

A) A subtitle should always be included in a table. B) If a subtitle is used, the font should be slightly larger than the title. C) A subtitle typically detracts from a table in PowerPoint. D) If you include a subtitle, it should be in a smaller font size.

Computer Science & Information Technology

Application errors expose a lot of information about the code and its environment.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology