Which of the following types of activities can be audited for security? Each correct answer represents a complete solution. Choose three.
Which of the following security issues does the Bell-La Padula model focus on?
In which of the following alternative processing sites is the backup facility maintained in a constant order, with a full complement of servers, workstations, and communication links ready to assume the primary operations responsibility?
Which of the following authentication protocols provides support for a wide range of authentication methods, such as smart cards and certificates?