Which two best practices must the cloud professional use to enforce authorization?

A customer that is hosting a multitenant environment is implementing a security framework to harden the environment. The engineer has employed some best practices to enforce AIC and AAA throughput the environment. Which two best practices must the cloud professional use to enforce authorization? (Choose two.)
A. security guards
B. separation of duty
C. biometric scanners
D. cameras
E. wire fencing

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.