What is a key security benefit when using identity and access management for authorization posturing services?

Posted by: Pdfprep Category: 210-250 Tags: , ,

What is a key security benefit when using identity and access management for authorization posturing services?
A . The user device is assigned a log key, which eliminates the need to authenticate the user or device when accessing the network.
B . The posturing service enables endpoint camera services to validate user identity.
C . The user will be provided different levels of access and service based on the device they are using when they enter their authentication credentials.
D . Authenticated devices allow multiple users to access network services using the same user authentication credentials.

Answer: C

Leave a Reply

Your email address will not be published.