Examine the following steps of privilege analysis for checking and revoking excessive, unused privileges granted to users

Examine the following steps of privilege analysis for checking and revoking excessive, unused privileges granted to users
1.Create a policy to capture the privileges used by a user for privilege analysis.
2.Generate a report with the data captured for a specified privilege capture.
3.Start analyzing the data captured by the policy.
4.Revoke the unused privileges.
5.Compare the used and unused privileges’ lists.
6.Stop analyzing the data.
Identify the correct sequence of steps.
A. 1,3, 5,6,2, 4
B. 1, 3,6, 2, 5,4
C. 1,3,2,5, 6, 4
D. 1,3,5, 2, 6, 4

Download Printable PDF. VALID exam to help you PASS.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.