Log Access
An administrator is able to load application logs to an ingestion appliance but unable to view the logs. The administrator is also unable to change the logs within the application. This could be an example of which of the following?
A. Integrity star
B. Role-based access control
C. Bell-Lapadulla
D. Attribute-based access control
7 votes
2
6 comments
S M
5
Log Access
CISSP Study Group
skool.com/cissp
Share resources, get advice, and connect with peers studying cybersecurity. Join our CISSP study group and connect with fellow professionals today!
Leaderboard (30-day)
powered by