PrepAway - Latest Free Exam Questions & Answers

Security administration procedures require read-only ac…

Security administration procedures require read-only access to:

PrepAway - Latest Free Exam Questions & Answers

A.
access control tables.

B.
security log files.

C.
logging options.

D.
user profiles.

Explanation:
Security administration procedures require read-only access to security log files to ensure that,
once generated, the logs are not modified. Logs provide evidence and track suspicious transactions
and activities. Security administration procedures require write access to access control tables to
manage and update the privileges according to authorized business requirements. Logging options
require write access to allow the administrator to update the way the transactions and user activities
aremonitored, captured, stored, processed and reported.


Leave a Reply