It's important to know how data is accessed because data access devices use different applications or clients and may have different security characteristics.
D is an interesting option, but I think C covers the key point about different security characteristics. Knowing this can help me implement the right safeguards.
C seems the most relevant, as different access devices may have different security requirements. I need to be aware of this to ensure appropriate controls are in place.
Tashia
3 months agoNana
1 months agoDorcas
1 months agoLeonie
1 months agoStefania
3 months agoHana
3 months agoDan
2 months agoLuis
2 months agoDonte
2 months agoCharlesetta
3 months agoGlory
2 months agoStefania
3 months agoCordell
3 months agoElenora
3 months agoIvory
2 months agoMyra
2 months agoAudrie
2 months agoAlison
4 months agoBelen
4 months agoMarg
4 months ago