D. Preventing data from being placed in unprotected storage.
Explanation:
Sophisticated Access Management (AM) techniques typically focus on controlling access based on factors like user role, location, and device type, but do not directly manage data storage practices or prevent data from being placed in unprotected storage. This responsibility often falls under data protection and security policies rather than access management.
Pg 109 of PG - Sophisticated access management techniques can restrict access to data based on the type of data being accessed, the role of the person accessing the data, the location of the user, the time of day, or the type of device being used to access the data
I think "B" might be correct. The question is asking for what is "NOT" provided by a "sophisticated" IAM solution. Option "B" seems to be the only solution that should be standard for even the basic IAM solution.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Ssourav
3 months, 2 weeks agoz80r
1 year, 10 months agoAhpl
2 years, 8 months agoAhpl
2 years, 8 months agoSbowo
2 years, 11 months agok4d4v4r
2 years, 11 months ago837vq3
2 years, 11 months agoflyingrain777
2 years, 12 months ago837vq3
3 years ago