Question
What method of securing an IT system uses permissions settings? Choose the answer.
Question 1 options:
Restricting access
Setting up system redundancy
Updating software
Installing an antimalware program
Question 1 options:
Restricting access
Setting up system redundancy
Updating software
Installing an antimalware program
Answers
GPT 3.5
Restricting access