PrepAway - Latest Free Exam Questions & Answers

which attribute other than individual identity and group membership can be used to restrict unauthorized acces

In the context of information security, which attribute other than individual identity and group
membership can be used to restrict unauthorized access?

PrepAway - Latest Free Exam Questions & Answers

A.
Role

B.
Cryptography

C.
World Wide Name

D.
Host network address

Explanation:
Securing Access
In secure storage environments, root or administrator privileges for a specific device are not
granted to every user. Instead, role-based access control (RBAC) is deployed to assign necessary
privileges to users, enabling them to perform their roles. A role may represent a job function, for
example, an administrator. Privileges are associated with the roles and users acquire these
privileges based upon their roles. It is also advisable to consider administrative controls, such as
“separation of duties,” when defining data center procedures.
EMC E10-001 Student Resource Guide. Module 14: Securing the Storage Infrastructure


Leave a Reply