What is typically NOT performed by sophisticated Access Management (AM) techniques?

Posted by: Pdfprep Category: CIPT Tags: , ,

What is typically NOT performed by sophisticated Access Management (AM) techniques?
A . Restricting access to data based on location.
B . Restricting access to data based on user role.
C . Preventing certain types of devices from accessing data.
D . Preventing data from being placed in unprotected storage.

Answer: B

Leave a Reply

Your email address will not be published.