List of questions
Related questions
Question 25 - CCAK discussion
Which of the following is a cloud-native solution designed to counter threats that do not exist within the enterprise?
A.
Policy based access control
B.
Attribute based access control
C.
Rule based access control
D.
Role based access control
Your answer:
0 comments
Sorted by
Leave a comment first