Which of the following is this an example of?
An administrator implements SELinux on a production web server. After implementing this, the web server no
longer serves up files from users’ home directories. To rectify this, the administrator creates a new policy as the
root user.
Which of the following is this an example of? (Choose two.)
Which of the following should be implemented to give th…
A company has 5 users. Users 1, 2 and 3 need access to payroll and users 3, 4 and 5 need access to sales.
Which of the following should be implemented to give the appropriate access while enforcing least privilege?
Which of the following BEST describes the email address?
A customer has provided an email address and password to a website as part of the login process. Which of
the following BEST describes the email address?
Which of the following techniques enables a highly secu…
Which of the following techniques enables a highly secured organization to assess security weaknesses in real
time?
what mode?
In order for network monitoring to work properly, you need a PC and a network card running in what mode?
Which of the following should be performed to help avoi…
A recent audit of a company’s identity management system shows that 30% of active accounts belong to
people no longer with the firm. Which of the following should be performed to help avoid this scenario? (Choose
two.)
Privilege creep among long-term employees can be mitiga…
Privilege creep among long-term employees can be mitigated by the following procedures:
Which of the following account management techniques sh…
A security analyst implemented group-based privileges within the company active directory. Which of the
following account management techniques should be undertaken regularly to ensure least privilege principles?
which of the following ways should the account be handled?
A supervisor in the human resources department has been given additional job duties in the accounting
department. Part of their new duties will be to check the daily balance sheet calculations on spreadsheets that
are restricted to the accounting group. In which of the following ways should the account be handled?
Which of the following practices reduces the management…
Which of the following practices reduces the management burden of access management?