Ch5 Flashcards
1
Q
Who grants users access to resources based on their proven identity
A
Administrators
2
Q
reviewing baseline security controls and selecting only those controls that apply to the IT system you’re trying to protect
A
scoping
3
Q
modifying the list of security controls within a baseline so that they align with the mission of the organization
A
tailoring