What can be used to limit the scope of a credential breach?
- A.Storage of secrets in a distributed ledger
- B.Enable audit logging
- C.Use of a short-lived dynamic secrets
- D.Sharing credentials between applications
Reference: examtopics_top_comment
Sign in to track wrong answers, get spaced-repetition reminders, and run timed exam mode.