which of the following is not a component of a control system course hero

by Dr. Ward Mertz 8 min read

What is the number of failed login attempts that trigger an account action called?

The number of failed logon attempts that trigger an account action is called an audit logon event.

Who develops weapons control systems for the military?

Tomahawk Industries develops weapons control systems for the military. The company designed a system that requires two different officers to enter their access codes before allowing the system to engage. Which principle of security is this following?

What are the methods used to identify a user to a system?

Common methods used to identify a user to a system include username, smart card, and biometrics.

What is an example of a threat to access control?

An example of a threat to access control is in a peer-to-peer (P2P) arrangement in which users share their My Documents folder with each other by accident.

What is content dependent access control?

Content-dependent access control requires the access control mechanism to look at the data to decide who should get to see it.

Can a subject change an object that has a lower integrity level?

Subjects cannot change objects that have a lower integrity level.

image