Notifications
Clear all
Topic starter
07/11/2022 11:56 pm
Authorization can BEST be accomplished by establishing:
- A . whether users are who they say they are
- B . who users can do when they are granted system access.
- C . how users identify themselves to information systems.
- D . the ownership of the data
Suggested Answer: B