Application data is protected from unauthorized access using _________________.

Authorization Controls
Mitigating Controls
Identification Controls
All of the above
Verified Answer
Correct Option - a

To get all Infosys Certified L2 Junior Security Professional Consultant Exam questions Join Telegram Group https://rebrand.ly/lex-telegram-236dee

Telegram