In Which of the following access control models can the creator of an object delegate permission
Correct Answer:
C
Risk tolerance also known as
Correct Answer:
D
A hacker gains access to an organization system without authorization and steal confidential data. What term best describes this ?
Correct Answer:
C
The process of applying secure configurations (to reduce the attack surface)
Correct Answer:
D
Which authentication helps build relationships between different technology providers, enabling automatic identification and user access. Employees no longer need to enter separate usernames and passwords when visiting a new service provider
Correct Answer:
D