ISC Exam Questions

What is the BEST approach for controlling access to highly sensitive information when employees have

What is the BEST approach for controlling access to highly sensitive information when employees have the same level of security clearance?

A. Audit logs

B. Role-Based Access Control (RBAC)

C. Two-factor authentication

D. Application of least privilege