A web-based front end for a business intelligence application uses pass-through authentication to authenticate users. The application then uses a service account to perform queries and look up data in a database. A security analyst discovers employees are accessing data sets they have not been authorized to use. Which of the following will fix the cause of the issue?
kiduuu
Highly Voted 2 years agoMeowson
2 years agoChilaqui1es
1 year, 6 months agoCyberCEH
Most Recent 1 year, 12 months ago