5:00
Stop
CISSP - Security Architecture Models - Role-Based Access Control Model
Beginner
1/5
Within an organization employing an RBAC model, how should access be allocated when an employee is promoted to a role that requires elevated permissions?
Beginner