An analyst was investigating an attack that took place on the network. A user was able to access the system without proper authentication. Which of the following will the analyst recommend, related to management approaches, in order to control access? (Choose three.)
A. RBAC
B. LEAP
C. DAC
D. PEAP
E. MAC
F. SCAP
G. BCP
CS0-002: CompTIA CySA+ ExamFULL Printable PDF and Software. VALID exam to help you PASS. |
A C E
That is what you are left with.
Mandatory, Discretionary, Role and Rule Based Access Control
Business Continuity Plan (BCP)
The Security Content Automation Protocol (SCAP) is a method for using specific standards to enable automated vulnerability management, measurement, and policy compliance evaluation of systems deployed in an organization, including e.g., FISMA
LEAP and PEAP are extensible authentication protocols that provide stronger authentication for newer 802.11 WLANs that support 802.1X port access control.