Matt, a security administrator, is responsible for provisioning role-based user accounts in an enterprise environment. A user has a temporary business need to perform multiple roles within the organization. Which of the following is the BEST solution to allow the user to perform multiple roles?

A. Create expiring unique user IDs per role
B. Allow access to an existing user ID
C. Assign multiple roles to the existing user ID
D. Create an additional expiring generic user ID

Ans: C. Assign multiple roles to the existing user ID

Computer Science & Information Technology

You might also like to view...

Which of the following describes a Class A IP address?

A. The last octet is between 1 and 128 with a subnet mask of 255.0.0.0 B. The first octet is between 1 and 128 with a subnet mask of 255.255.255.0 C. The first octet is between 1 and 128 with a subnet mask of 255.0.0.0 D. The last octet is between 1 and 128 with a subnet mask of 255.255.255.0

Computer Science & Information Technology

When video files are played while being downloaded from the Internet, it is called _____.

A. video compression B. virtual reality C. streaming video D. file conversion

Computer Science & Information Technology