Posted by: Pdfprep
Post Date: September 19, 2021
What is typically NOT performed by sophisticated Access Management (AM) techniques?
A . Restricting access to data based on location.
B . Restricting access to data based on user role.
C . Preventing certain types of devices from accessing data.
D . Preventing data from being placed in unprotected storage.
Answer: B
Leave a Reply