Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.
A. Secure configurations and access controls.
Justification: Secure configurations and access controls are controls that help protect externally stored sensitive or confidential data from cyberthreats. Secure configurations involve implementing appropriate security settings, such as encryption, access controls, and firewall rules, to safeguard the stored data. Access controls ensure that only authorized individuals or systems can access and manipulate the data, reducing the risk of unauthorized access or data breaches.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Domiii
3 months, 1 week agoWalewweeeed
2 years, 9 months agoMike12345678
3 years agoWalewweeeed
2 years, 10 months ago