What is the answer for question 3:
3. This type of “creep” is one of the risks associated with User Life Cycle Management.
1 Like
What course is this?
Sorry. It’s for the Cyber Security Fundamentals course
So we can’t freely provide answers to the in-course/in-lab questions, but you should be able to find this answer in the Access Management lesson. Just double-checked, and it’s definitely there.