Examine the following steps of privilege analysis for checking and revoking excessive, unused privileges granted to users:
1. Create a policy to capture the privilege used by a user for privilege analysis.
2. Generate a report with the data captured for a specified privilege capture.
3. Start analyzing the data captured by the policy.
4. Revoke the unused privileges.
5. Compare the used and unused privileges' lists.
6. Stop analyzing the data.
Identify the sequence of steps.
A. 1, 3, 5, 6, 2, 4
B. 1, 3, 6, 2, 5, 4
C. 1, 3, 2, 5, 6, 4
D. 1, 3, 2, 5, 6, 4
E. 1, 3, 5, 2, 6, 4
Answer: B
No comments:
Post a Comment
Note: only a member of this blog may post a comment.