I remember discussing remediation exercises, but I don't think that's the best way to distinguish risks. It seems more like a follow-up action rather than a distinguishing method.
I’m a bit confused about the difference between compliance and privacy risks. I thought they were closely related, but maybe option A is more focused on privacy?
I think I remember that a privacy risk assessment is usually the first step in identifying risks, but I'm not entirely sure if it's the best way to distinguish them.
Ah, I think I know this one. The Database Access Point seems like the most likely answer to facilitate the connection between the WFM Server and Database. I'll mark that one down.
This is a tricky one. We want to give Admin5 the ability to view the metrics, but not grant them more access than they need. I'm going to review the role descriptions closely to determine the best fit for the principle of least privilege.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Justa
4 months agoIlona
4 months agoCherilyn
4 months agoNoel
4 months agoLouisa
5 months agoVirgina
5 months agoJoanne
5 months agoViva
5 months agoEleonore
5 months agoAlida
5 months agoLore
5 months agoDana
5 months agoTruman
5 months agoLashon
5 months ago