Related questions
Question 75 - IIA-CIA-Part3 discussion
Which of the following activities best illustrates a user's authentication control?
A.
Identity requests are approved in two steps.
B.
Logs are checked for misaligned identities and access rights.
C.
Users have to validate their identity with a smart card.
D.
Functions can toe performed based on access rights
Your answer:
0 comments
Sorted by
Leave a comment first