You perform a security trace when troubleshooting a data access problem for a user. The results are shown in the exhibit.
What should you do to solve this issue?
Limited Time Offer
25%
Off
Charlene
2 hours ago