Cybersecurity management basics [1.2 Access Management]

[ON QUESTION 4, anyone face a challenge, am pretty sure am submitting the correct answer. I have researched more on the concepts to confirm my answers but nothing seems to be right]

You will hear the answer at 5:04 in the video. The instructor uses an important keyword in the video that corresponds to the answer.

Google can also help…