CISSP: Access Control
Calculating your score ...
Click your answer, then NEXT and END when you are done to find out how you got on!
1 of 10
1. For an effective access control strategy, which is the third step:
Define the level of use of a resource, and the permissions required
Define the resources existing in the environment
Define who can access given resources