which of the following is a security control that should be in place?
Human Resources suspect an employee is accessing the employee salary database. The administrator is
asked to find out who it is. In order to complete this task, which of the following is a security control that
should be in place?
Which of the following is BEST suited when assigning user rights to individuals in the sales department?
A network administrator is configuring access control for the sales department which has high employee
turnover. Which of the following is BEST suited when assigning user rights to individuals in the sales
department?
Which of the following would be the BEST way to manage folder security?
A new network administrator is setting up a new file server for the company. Which of the following
would be the BEST way to manage folder security?
Which of the following methods should the system administrator implement?
A new intern was assigned to the system engineering department, which consists of the system architect
and system software developer’s teams. These two teams have separate privileges. The intern requires
privileges to view the system architectural drawings and comment on some software development
projects. Which of the following methods should the system administrator implement?
Which of the following security controls would be implemented to restrict those departments?
A system administrator needs to ensure that certain departments have more restrictive controls to their
shared folders than other departments. Which of the following security controls would be implemented
to restrict those departments?
Which of the following practices reduces the management burden of access management?
Which of the following practices reduces the management burden of access management?
which of the following ways should the account be handled?
A supervisor in the human resources department has been given additional job duties in the accounting
department. Part of their new duties will be to check the daily balance sheet calculations on spreadsheets
that are restricted to the accounting group. In which of the following ways should the account be
handled?
Which of the following account management techniques should be undertaken regularly to ensure least privilege
A security analyst implemented group-based privileges within the company active directory. Which of the
following account management techniques should be undertaken regularly to ensure least privilege
principles?
which of the following procedures?
Privilege creep among long-term employees can be mitigated by which of the following procedures?
Which of the following should be performed to help avoid this scenario?
A recent audit of a company’s identity management system shows that 30% of active accounts belong to
people no longer with the firm. Which of the following should be performed to help avoid this scenario?
(Select TWO).