00:00

QUESTION 101

In Which of the following access control models can the creator of an object delegate permission

Correct Answer: C

QUESTION 102

Risk tolerance also known as

Correct Answer: D

QUESTION 103

A hacker gains access to an organization system without authorization and steal confidential data. What term best describes this ?

Correct Answer: C

QUESTION 104

The process of applying secure configurations (to reduce the attack surface)

Correct Answer: D

QUESTION 105

Which authentication helps build relationships between different technology providers, enabling automatic identification and user access. Employees no longer need to enter separate usernames and passwords when visiting a new service provider

Correct Answer: D