Assets, Threats, and Vulnerabilities | Weekly challenge 2 Quiz |
What are common authorization tools that are designed with the principle of least privilege and separation of duties in mind? Select three answers.
- SHA256
- OAuth
- API Tokens
- Basic auth
Assets, Threats, and Vulnerabilities | Weekly challenge 2 Quiz |
What are common authorization tools that are designed with the principle of least privilege and separation of duties in mind? Select three answers.