Which of the following are functions that are compatible in a properly separated environment

Which of the following are functions that are compatible in a properly segregated environment?

Which of the following are functions that are compatible in a properly separated environment

A.
Application programming and computer operation

B.
Systems programming and job control analysis

C.
Access authorization and database administration

D.
System development and systems maintenance

Explanation:
If you think about it, System development and system maintenance are perfectly
compatible, you can develop in the systems for certain time, and when it time for a maintenance,
you stop the development process an make the maintenance. It’s a pretty straight forward
process. The other answer do not provide the simplicity and freedom of this option.
Incorrect answer:
Access authorization and database administration are NEVER compatible.

What is the most common way to classify IDSS?

The most common way to classify intrusion-detection systems is to group them according to the location of the information source. Basic information sources are network packets captured from a network backbone or local network segments, operating systems, and critical files.

What tool is being used to determine whether attackers have altered system files of executables?

File integrity monitoring (FIM) refers to an IT security process and technology that tests and checks operating system (OS), database, and application software files to determine whether or not they have been tampered with or corrupted.

What is the primary reason for designing the security kernel to be as small as possible?

System performance and execution are enhanced. Due to its compactness, the kernel is easier to formally verify.