The stakeholders of a software company havefour new security requirements that they are considering including in the next release of their flagship product: Two-factor authentication (2FA), Captcha for Bot Detection (CBT), Password Expirations (PEX), and Role-base access control (RBA).
Given the time constraints, they may not be able to include all, so they need to prioritize these requirements based onthree criteria: Maintainability (MA), Ease of Use (EU), and Integration Support (IS). They have the following pairwise preferences of the criteria:
Based on the above information, do the following:
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here