PdfPrep.com

Which of the following will the analyst recommend, related to management approaches, in order to control access?

An analyst was investigating the attack that took place on the network. A user was able to access the system without proper authentication.

Which of the following will the analyst recommend, related to management approaches, in order to control access? (Choose three.)
A . RBAC
B . LEAP
C . DAC
D . PEAP
E . MAC
F . SCAP
G . BCP

Answer: ACE

Exit mobile version