Which of the following guidelines would help incident handlers eradicate insider at tacks by privileged users?

Eric works as a system administrator at ABC organization and previously granted several users with access privileges to the organizations systems with unlimited permissions. These privileged users could prospectively misuse their rights unintentionally, maliciously, or could be deceived by attackers that could trick them to perform malicious activities.

Which of the following guidelines would help incident handlers eradicate insider at tacks by privileged users?
A . Do not allow administrators to use unique accounts during the installation process
B . Do not use encryption methods to prevent administrators and privileged users from accessing backup tapes and sensitive information
C . Do not control the access to administrators and privileged users
D . Do not enable default administrative accounts to ensure accountability

Answer: D

Latest 212-89 Dumps Valid Version with 163 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments