List of questions
Related questions
Question 47 - IT Risk Fundamentals discussion
An enterprise that uses a two-factor authentication login method for accessing sensitive data has implemented which type of control?
A.
Preventive
B.
Corrective
C.
Detective
Your answer:
0 comments
Sorted by
Leave a comment first