Which of the following security controls enforces user permissions based on a job role?

A. Single sign-on access
B. Group based privileges
C. Account policy enforcement
D. User assigned privileges


Ans: B. Group based privileges

Computer Science & Information Technology

You might also like to view...

Scanning a product's ________ code with a smartphone can take you to a website, a video, or a Facebook page for more information about the product

Fill in the blank(s) with correct word

Computer Science & Information Technology

Click the Formulas icon in the Design tab of the Ribbon to add a calculated field to a PivotTable

Indicate whether the statement is true or false

Computer Science & Information Technology

____________________ time is the hours of a 24-hour day that are not specified as working time.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) ____________________ is a set of predefined styles for a particular type of document, e.g., memo or letter.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology