During a routine check, a system administrator identifies unusual activity indicating an intruder within a firewall.
Which of the following controls has MOST likely been compromised?
Click on the arrows to vote for the correct answer
A. B. C. D.A.
Based on the scenario described, the most likely control that has been compromised is authentication.
Authentication is the process of verifying the identity of a user or system component, typically through a combination of a username and password or other credentials. If an intruder has gained unauthorized access to a system, they may have bypassed or compromised the authentication controls, allowing them to gain access to the system.
Identification, on the other hand, is the process of identifying a user or system component by assigning a unique identifier, such as a username or ID number. Data validation refers to the process of checking that input data is correct and meets certain criteria, while data integrity refers to the accuracy and consistency of data over its entire lifecycle.
While all of these controls are important for maintaining the security and integrity of a system, in this particular scenario, the fact that the system administrator has identified unusual activity indicating an intruder within the firewall suggests that the intruder has already gained access to the system, likely through compromising the authentication controls. Therefore, authentication is the most likely control that has been compromised.