What is the result of an access control management process that adds new capabilities to users as their job tasks change over time, but does not perform a regular reassessment of the assigned authorization?

A. Collusion
B. Collision
C. Privilege creep
D. Fraud and abuse


Answer: C. Privilege creep

Computer Science & Information Technology

You might also like to view...

Four Python thread synchronization mechanisms are _____,_______ ,______ and ______.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

They symbols =, >, and < are known as:

a. aggregate functions b. comparison operators c. logical operators

Computer Science & Information Technology

Where do the column headings display in a crosstab query?

A) Along the right side of a crosstab query B) Along the top of a crosstab query C) Along the left side of a crosstab query D) Along the bottom of a crosstab query

Computer Science & Information Technology

With the Exclude Overlap pathfinder, a hole is created where objects overlap.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology