Question: what is the term for the policies and technologies implemented to protect, limit, monitor, audit, and govern identities with access to sensitive data and resources?
- identity and access management (IAM)
 - privileged account management (PAM)
 - authentication and authorization
 - least privilege
 
Answer: The correct answer of the above question is Option A:identity and access management (IAM)