Which of the following is the BEST approach to perform risk mitigation of user access control rights?
Which of the following would be used when a higher level of security is desired for encryption key storage?
Which of the following MUST be updated immediately when an employee is terminated to prevent unauthorized access?