Question 1
Which of the following is an example of a factor used in multi-factor authentication (MFA)?
Question 2
Which of the following best describes the principle of least privilege in access control?
Question 3
Which of the following is an example of a secure credential management practice?
Question 4
Which of the following best describes how role-based access control (RBAC) works?
Question 5
Which of the following is a key benefit of using the principle of least privilege?