by the department manager, and read only for the individual employee. Which of the following is the
name for the access control methodology used?
A.
Duty separation
B.
Mandatory
C.
Least privilege
D.
Role-based
by the department manager, and read only for the individual employee. Which of the following is the
name for the access control methodology used?
by the department manager, and read only for the individual employee. Which of the following is the
name for the access control methodology used?
A.
Duty separation
B.
Mandatory
C.
Least privilege
D.
Role-based