What is the result of an access control management process that adds new capabilities to users as their job tasks change over time, but does not perform a regular reassessment of the assigned authorization?
A. Collusion
B. Collision
C. Privilege creep
D. Fraud and abuse
Answer: C. Privilege creep
Computer Science & Information Technology
You might also like to view...
Four Python thread synchronization mechanisms are _____,_______ ,______ and ______.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
They symbols =, >, and < are known as:
a. aggregate functions b. comparison operators c. logical operators
Computer Science & Information Technology
Where do the column headings display in a crosstab query?
A) Along the right side of a crosstab query B) Along the top of a crosstab query C) Along the left side of a crosstab query D) Along the bottom of a crosstab query
Computer Science & Information Technology
With the Exclude Overlap pathfinder, a hole is created where objects overlap.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology