A web-based front end for a business intelligence application uses pass-through authentication to authenticate users. The application then uses a service account to perform queries and look up data in a database. A security analyst discovers employees are accessing data sets they have not been authorized to use. Which of the following will fix the cause of the issue?
kiduuu
Highly Voted 2 years, 2 months agoMeowson
2 years, 2 months agoChilaqui1es
1 year, 8 months agoCyberCEH
Most Recent 2 years, 1 month ago