PrepAway - Latest Free Exam Questions & Answers

Security administration procedures require read-only access to:

Security administration procedures require read-only access to:

PrepAway - Latest Free Exam Questions & Answers

A.
access control tables.

B.
security log files.

C.
logging options.

D.
user profiles.

Explanation:

Security administration procedures require read-only access to security log files to ensure that,
once generated, the logs are not modified. Logs provide evidence and track suspicious
transactions and activities. Security administration procedures require write access to access
control tables to manage and update the privileges according to authorized business
requirements. Logging options require write access to allow the administrator to update the way
the transactions and user activities aremonitored, captured, stored, processed and reported.


Leave a Reply