CIPT Exam QuestionsBrowse all questions from this exam

CIPT Exam - Question 121


What is typically NOT performed by sophisticated Access Management (AM) techniques?

Show Answer
Correct Answer: D

Sophisticated Access Management (AM) techniques typically focus on controlling and restricting access to data based on factors like location, user roles, and device types. However, preventing data from being placed in unprotected storage generally falls under data protection and data loss prevention mechanisms, not standard access management techniques.

Discussion

9 comments
Sign in to comment
837vq3
Oct 31, 2021

why not "D"?

flyingrain777Option: D
Nov 28, 2021

why not "D"?

837vq3
Dec 3, 2021

I think "B" might be correct. The question is asking for what is "NOT" provided by a "sophisticated" IAM solution. Option "B" seems to be the only solution that should be standard for even the basic IAM solution.

k4d4v4rOption: D
Dec 4, 2021

Every other type is possible whithin IAM

Sbowo
Dec 26, 2021

A, B, C answer is on chapter 4.2 book Privacy in Technology

Ahpl
Mar 13, 2022

Answer is D...

Ahpl
Mar 13, 2022

Pg 109 of PG - Sophisticated access management techniques can restrict access to data based on the type of data being accessed, the role of the person accessing the data, the location of the user, the time of day, or the type of device being used to access the data

z80rOption: D
Jan 22, 2023

D is the correct one

SsouravOption: D
Aug 10, 2024

D. Preventing data from being placed in unprotected storage. Explanation: Sophisticated Access Management (AM) techniques typically focus on controlling access based on factors like user role, location, and device type, but do not directly manage data storage practices or prevent data from being placed in unprotected storage. This responsibility often falls under data protection and security policies rather than access management.