What is typically NOT performed by sophisticated Access Management (AM) techniques?
What is typically NOT performed by sophisticated Access Management (AM) techniques?
Sophisticated Access Management (AM) techniques typically focus on controlling and restricting access to data based on factors like location, user roles, and device types. However, preventing data from being placed in unprotected storage generally falls under data protection and data loss prevention mechanisms, not standard access management techniques.
why not "D"?
why not "D"?
I think "B" might be correct. The question is asking for what is "NOT" provided by a "sophisticated" IAM solution. Option "B" seems to be the only solution that should be standard for even the basic IAM solution.
Every other type is possible whithin IAM
A, B, C answer is on chapter 4.2 book Privacy in Technology
Answer is D...
Pg 109 of PG - Sophisticated access management techniques can restrict access to data based on the type of data being accessed, the role of the person accessing the data, the location of the user, the time of day, or the type of device being used to access the data
D is the correct one
D. Preventing data from being placed in unprotected storage. Explanation: Sophisticated Access Management (AM) techniques typically focus on controlling access based on factors like user role, location, and device type, but do not directly manage data storage practices or prevent data from being placed in unprotected storage. This responsibility often falls under data protection and security policies rather than access management.