PrepAway - Latest Free Exam Questions & Answers

Security administration procedures require read-only ac…

Security administration procedures require read-only access to:

PrepAway - Latest Free Exam Questions & Answers

A.
access control tables.

B.
security log files.

C.
logging options.

D.
user profiles.

Explanation:
Security administration procedures require read-only access to security log files to ensure that, once generated,
the logs are not modified. Logs provide evidence and track suspicious transactions and activities. Security
administration procedures require write access to access control tables to manage and update the privileges
according to authorized business requirements. Logging options require write access to allow the administrator
to update the way the transactions and user activities are monitored, captured, stored, processed and reported.


Leave a Reply