CISM Certified Information Security Manager – Question0586

Authorization can BEST be accomplished by establishing:

A.
the ownership of the data.
B. what users can do when they are granted system access.
C. whether users are who they say they are.
D. how users identify themselves to information systems.

Correct Answer: B