During a third-party audit, it is determined that a member of the firewall team can request, approve, and implement a new rule-set on the firewall.Which of the following will the audit team most l likely recommend during the audit out brief?

A. Discretionary access control for the firewall team
B. Separation of duties policy for the firewall team
C. Least privilege for the firewall team
D. Mandatory access control for the firewall team


Answer: B. Separation of duties policy for the firewall team

Computer Science & Information Technology

You might also like to view...

The elements of an array can be

A) strings. B) structures. C) objects. D) any of the above. E) none of the above.

Computer Science & Information Technology

RTF supports fewer formats than HTML or Plain Text, as well as hyperlinks.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A program whose only task is to test a method is called a:

(a) driver program (b) stub (c) bottom-up test (d) recursive method

Computer Science & Information Technology

The Home tab, which opens Backstage view, includes file management commands such as the Save, Save As, Open, Close, and Print commands.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology