What security risk does the role-based access approach mitigate MOST effectively?

What security risk does the role-based access approach mitigate MOST effectively?

What security risk does the role-based access approach mitigate MOST effectively?

A.
Excessive access rights to systems and data

B.
Segregation of duties conflicts within business applications

C.
Lack of system administrator activity monitoring

D.
Inappropriate access requests



Leave a Reply 0

Your email address will not be published. Required fields are marked *

5 × 3 =