What is the BEST approach for controlling access to highly sensitive information when employees have the same level of security clearance?
What is the BEST approach for controlling access to highly sensitive information when employees have the same level of security clearance?
A . Audit logs
B . Role-Based Access Control (RBAC)
C . Two-factor authentication
D . Application of least privilege
Answer: B
Latest CISSP Dumps Valid Version with 981 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments