Jonny Is an IT Project Manager. He cannot access the folder called "IT Projects" but can access a folder called "Sales Data" even though he's not on the sales team. Which information security principle has failed?
I'm pretty confident this is a question about authorization. Jonny is able to access a folder he's not supposed to, so the authorization principles have been violated. I'll select option B.
Okay, I think I've got it. The issue here is that Jonny can access a folder he shouldn't be able to, which means the authorization controls have failed. The correct answer is B, Authorization.
Hmm, I'm a bit confused. Is this about Jonny not being able to access the "IT Projects" folder, or about him being able to access the "Sales Data" folder? I need to re-read the question carefully.
This seems like a straightforward authorization question. I'll focus on understanding the difference between authentication, authorization, identification, and accountability.
The Geolocation field type seems like the obvious choice to me. It's designed specifically for capturing coordinate data, which is exactly what the question is asking for.
Okay, let's see. The Cisco ISE server is involved, so I'm guessing the options will be related to how it interacts with the identity store, either internal or external. I'll need to think through each option carefully.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Flo
3 months agoRozella
3 months agoStevie
3 months agoPaola
4 months agoAlfreda
4 months agoAbel
4 months agoParis
4 months agoOra
4 months agoElinore
5 months agoAshanti
5 months agoElroy
5 months agoWilletta
5 months agoLindsey
5 months agoHillary
5 months agoTequila
5 months ago