Question: what is the term for the policies and technologies implemented to protect, limit, monitor, audit, and govern identities with access to sensitive data and resources?

  1. identity and access management (IAM)
  2. privileged account management (PAM)
  3. authentication and authorization
  4. least privilege

Answer: The correct answer of the above question is Option A:identity and access management (IAM)