Which of the following risk mitigation strategies would be MOST appropriate when a user changes job roles?
Which of the following technologies will enforce protections on these systems to prevent files and services from operating outside of a strict rule set?