Which of the following practices reduces the management burden of access management?
Which of the following practices reduces the management burden of access management?
which of the following ways should the account be handled?
A supervisor in the human resources department has been given additional job duties in the
accounting department. Part of their new duties will be to check the daily balance sheet
calculations on spreadsheets that are restricted to the accounting group. In which of the following
ways should the account be handled?
Which of the following account management techniques should be undertaken regularly to ensure least privilege
A security analyst implemented group-based privileges within the company active directory. Which
of the following account management techniques should be undertaken regularly to ensure least
privilege principles?
which of the following procedures?
Privilege creep among long-term employees can be mitigated by which of the following
procedures?
Which of the following should be performed to help avoid this scenario?
A recent audit of a company’s identity management system shows that 30% of active accounts
belong to people no longer with the firm. Which of the following should be performed to help avoid
this scenario? (Select TWO).
what mode?
In order for network monitoring to work properly, you need a PC and a network card running in
what mode?
Which of the following techniques enables a highly secured organization to assess security weaknesses in real
Which of the following techniques enables a highly secured organization to assess security
weaknesses in real time?
Which of the following BEST describes the email address?
A customer has provided an email address and password to a website as part of the login
process. Which of the following BEST describes the email address?
Which of the following should be implemented to give the appropriate access while enforcing least privilege?
A company has 5 users. Users 1, 2 and 3 need access to payroll and users 3, 4 and 5 need
access to sales. Which of the following should be implemented to give the appropriate access
while enforcing least privilege?
which of the following?
An administrator implements SELinux on a production web server. After implementing this, the
web server no longer serves up files from users’ home directories. To rectify this, the administrator
creates a new policy as the root user. This is an example of which of the following? (Select TWO).