Multiple Choice
Ideally,access control should be based on ________.
A) individuals
B) roles
C) standard authorizations
D) a three-headed dog named Fluffy
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q44: Major incidents are handled by the _.<br>A)
Q45: Which of the following is a normal
Q46: Successful attacks are called _.<br>A) incidents<br>B) countermeasures<br>C)
Q47: Balancing threats against protection costs is called
Q48: Which of the following MUST be followed?<br>A)
Q50: Policies are separated by implementation to take
Q51: The rate of alarms in IDSs is
Q52: Desktop (tabletop)rehearsals are important because they _
Q53: By changing credentials verification information on a(n)_,a
Q54: Servers in the DMZ should be freely