EMC Exam Questions

In the context of information security, which attribute other than individual identity and group mem

In the context of information security, which attribute other than individual identity and group membership can be used to restrict unauthorized access?

A.
Role

B.
Cryptography

C.
World Wide Name

D.
Host network address