Which of the following should be implemented during the authorization stage?

A technician wants to implement a dual factor authentication system that will enable the
organization to authorize access to sensitive systems on a need-to-know basis. Which of the
following should be implemented during the authorization stage?

A technician wants to implement a dual factor authentication system that will enable the
organization to authorize access to sensitive systems on a need-to-know basis. Which of the
following should be implemented during the authorization stage?

A.
Biometrics

B.
Mandatory access control

C.
Single sign-on

D.
Role-based access control

Explanation:



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Heather P

Heather P

WRONG IT IS B. Mandatory access control