What is the BEST approach for controlling access to highly sensitive information when employees have the same level of security clearance?
A . Audit logs
B . Role-Based Access Control (RBAC)
C . Two-factor authentication
D . Application of least privilege
Answer: B
Latest CISSP Dumps Valid Version with 981 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund