List of questions
Related questions
Question 120 - CIPT discussion
What is typically NOT performed by sophisticated Access Management (AM) techniques?
A.
Restricting access to data based on location.
B.
Restricting access to data based on user role.
C.
Preventing certain types of devices from accessing data.
D.
Preventing data from being placed in unprotected storage.
Your answer:
0 comments
Sorted by
Leave a comment first