181k views
3 votes
The principle of boundaries includes all EXCEPT

a. software programs for access validation.
b. authentication procedures.
c. audit-trail mechanisms.
d. off-site storage of data.

1 Answer

5 votes

Final answer:

In the context of information security, 'off-site storage of data' does not fall under the principle of boundaries. This principle involves active measures like software for access validation, authentication procedures, and audit-trail mechanisms, whereas off-site storage is a passive data protection strategy.

Step-by-step explanation:

The principle of boundaries in information security includes a variety of measures designed to protect data by establishing perimeters within which safety controls are implemented. However, among the options provided:

  • Software programs for access validation
  • Authentication procedures
  • Audit-trail mechanisms

all directly relate to the control and monitoring of access to sensitive information. Off-site storage of data, on the other hand, is primarily a data protection and recovery strategy rather than a boundary control mechanism. Therefore, the answer to the student's question would be 'd. off-site storage of data' does not typically fall under the principle of boundaries, which is more concerned with immediate and active protective measures.