Which of the following account management techniques should be undertaken regularly to ensure least privilege
A security analyst implemented group-based privileges within the company active directory. Which
of the following account management techniques should be undertaken regularly to ensure least
privilege principles?
which of the following procedures?
Privilege creep among long-term employees can be mitigated by which of the following
procedures?
Which of the following should be performed to help avoid this scenario?
A recent audit of a company’s identity management system shows that 30% of active accounts
belong to people no longer with the firm. Which of the following should be performed to help avoid
this scenario? (Select TWO).
what mode?
In order for network monitoring to work properly, you need a PC and a network card running in
what mode?
Which of the following techniques enables a highly secured organization to assess security weaknesses in real
Which of the following techniques enables a highly secured organization to assess security
weaknesses in real time?
Which of the following BEST describes the email address?
A customer has provided an email address and password to a website as part of the login
process. Which of the following BEST describes the email address?
Which of the following should be implemented to give the appropriate access while enforcing least privilege?
A company has 5 users. Users 1, 2 and 3 need access to payroll and users 3, 4 and 5 need
access to sales. Which of the following should be implemented to give the appropriate access
while enforcing least privilege?
which of the following?
An administrator implements SELinux on a production web server. After implementing this, the
web server no longer serves up files from users’ home directories. To rectify this, the administrator
creates a new policy as the root user. This is an example of which of the following? (Select TWO).
Which of the following represents the greatest threat to maintaining data confidentiality with these devices?
A security administrator has deployed all laptops with Self Encrypting Drives (SED) and enforces
key encryption. Which of the following represents the greatest threat to maintaining data
confidentiality with these devices?
Which of the following policies should be enforced to prevent this from happening?
A recent review of accounts on various systems has found that after employees’ passwords are
required to change they are recycling the same password as before. Which of the following
policies should be enforced to prevent this from happening? (Select TWO).