Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Which of the following properties aim to generate a trail to identify the source and path of attack?
Home
SSA Audits
Which of the following properties aim to generate a trail to identify the source and path of attack?
0
votes
asked
Feb 15, 2022
in
SSA Audits
by
sharadyadav1986
Which of the following properties aim to generate a trail to identify the source and path of attack?
Select the correct option from below list
1. Repudiation
2. Resilience
3. Traceability
4. Accountability
path-of-attack
audit-process
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Feb 15, 2022
by
sharadyadav1986
3. Traceability properties aim to generate a trail to identify the source and path of attack
Your comment on this answer:
Email me at this address if a comment is added after mine:
Email me if a comment is added after mine
Privacy: Your email address will only be used for sending these notifications.
Related questions
0
votes
Q: How often are process audits carried out?
asked
Feb 15, 2022
in
SSA Audits
by
sharadyadav1986
audit-process
audit-time
0
votes
Q: Which of the following tool is used to generate API documentation in HTML format from doc comments in source code?
asked
Apr 8, 2021
in
JAVA
by
SakshiSharma
java
java-questions-and-answers
java-mcq
core-java-mcq
java-multiple-choice-questions
java-questions-2021
java-interview-questions
java-advanced-questions
Java-questions-answers
0
votes
Q: Which of the following is a best practice for Audit Trail and Logging?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
audit-trail
audit-logging
audit
secure-programming-practices
0
votes
Q: Identify the incorrect path argument.
asked
Jun 25, 2022
in
Django
by
sharadyadav1986
django
path-argument
0
votes
Q: ____________ is a built-in tool for WorkFusion studio to identify the properties and values of objects depending on location.
asked
Feb 11, 2022
in
WorkFusion RPA Express
by
rajeshsharma
workfusion-studio
0
votes
Q: Which of the following is an intensive review performed to confirm compliance with the customer’s security, privacy, and reliability requirements?
asked
Feb 15, 2022
in
SSA Audits
by
sharadyadav1986
ssa-compliance
customer-security
0
votes
Q: Which of the following SSA audit types involves simulating real-life attacker in the unprivileged and privileged modes?
asked
Feb 15, 2022
in
SSA Audits
by
sharadyadav1986
ssa-audit-types
ssa-audit-modes
0
votes
Q: Identify the two actions that you must take if you want to edit the properties of an existing application flow?
asked
Feb 18
in
Taleo
by
john ganales
application-flow
0
votes
Q: Identify the two actions that you must take if you want to edit the properties of an existing application flow?
asked
Feb 16
in
Taleo
by
Robin
application-flow
0
votes
Q: Which of the following is a highly data-oriented review that provides independent inputs on SSA strategies?
asked
Feb 15, 2022
in
SSA Audits
by
sharadyadav1986
ssa-strategies
...