List of questions
Related questions
Question 1 - Cybersecurity Audit discussion
in key protection/management, access should be aligned with which of the following?
A.
System limitation
B.
Least privilege
C.
Position responsibilities
D.
Role descriptions
Your answer:
0 comments
Sorted by
Leave a comment first