Which of the following security controls would be implemented to restrict those departments?
A system administrator needs to ensure that certain departments have more restrictive controls to their
shared folders than other departments. Which of the following security controls would be implemented
to restrict those departments?
Which of the following practices reduces the management burden of access management?
Which of the following practices reduces the management burden of access management?
which of the following ways should the account be handled?
A supervisor in the human resources department has been given additional job duties in the accounting
department. Part of their new duties will be to check the daily balance sheet calculations on spreadsheets
that are restricted to the accounting group. In which of the following ways should the account be
handled?
Which of the following account management techniques should be undertaken regularly to ensure least privilege
A security analyst implemented group-based privileges within the company active directory. Which of the
following account management techniques should be undertaken regularly to ensure least privilege
principles?
which of the following procedures?
Privilege creep among long-term employees can be mitigated by which of the following procedures?
Which of the following should be performed to help avoid this scenario?
A recent audit of a company’s identity management system shows that 30% of active accounts belong to
people no longer with the firm. Which of the following should be performed to help avoid this scenario?
(Select TWO).
what mode?
In order for network monitoring to work properly, you need a PC and a network card running in what
mode?
Which of the following techniques enables a highly secured organization to assess security weaknesses in real
Which of the following techniques enables a highly secured organization to assess security weaknesses in
real time?
Which of the following BEST describes the email address?
A customer has provided an email address and password to a website as part of the login process. Which
of the following BEST describes the email address?
Which of the following should be implemented to give the appropriate access while enforcing least privilege?
A company has 5 users. Users 1, 2 and 3 need access to payroll and users 3, 4 and 5 need access to sales.
Which of the following should be implemented to give the appropriate access while enforcing least
privilege?