Which of the following is the BEST approach for data owners to use when defining access privileges for users? A. Implement an identity and access management (IDM) tool. B. Adopt user account settings recommended by the vendor. C. Perform a risk assessment of the users' access privileges. D. Define access privileges based on user roles. Â Suggested Answer: D This question is in CISM exam For getting Certified Information Security Manager Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by ISACA. The website does not contain actual questions and answers from ISACA's Certification Exams. Trademarks, certification & product names are used for reference only and belong to ISACA.
Please login or Register to submit your answer