Which three approaches are valid for improving activity security? (Choose Three)

Which three approaches are valid for improving activity security? (Choose Three)
A . Select the activity type to limit which rule types can call the activity.
B . Limit the activity to calling activities of the same Apply to class.
C . Configure the activity to require authentication to prevent unauthorized use.
D . Configure the activity to restrict individual parameters to authorized users.
E . Apply a privilege to the activity to restrict the activity to authorized users.

Answer: ACE

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments