When designing a networked Information System (IS) where there will be several different types of individual access, what is the FIRST step that should be taken to ensure all access control requirements are addressed?
A . Create a user profile.
B . Create a user access matrix.
C . Develop an Access Control List (ACL).
D . Develop a Role Based Access Control (RBAC) list.
Answer: B
Latest CISSP Dumps Valid Version with 981 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund