Identify the correct sequence of steps.

Examine the following steps of privilege analysis for checking and revoking excessive, unused
privileges granted to users:

1. Create a policy to capture the privilege used by a user for privilege analysis.
2. Generate a report with the data captured for a specified privilege capture.
3. Start analyzing the data captured by the policy.
4. Revoke the unused privileges.
5. Compare the used and unused privileges’ lists.
6. Stop analyzing the data.
Identify the correct sequence of steps.

Examine the following steps of privilege analysis for checking and revoking excessive, unused
privileges granted to users:

1. Create a policy to capture the privilege used by a user for privilege analysis.
2. Generate a report with the data captured for a specified privilege capture.
3. Start analyzing the data captured by the policy.
4. Revoke the unused privileges.
5. Compare the used and unused privileges’ lists.
6. Stop analyzing the data.
Identify the correct sequence of steps.

A.
1, 3, 5, 6, 2, 4

B.
1, 3, 6, 2, 5, 4

C.
1, 3, 2, 5, 6, 4

D.
1, 3, 2, 5, 6, 4

E.
1, 3, 5, 2, 6, 4

Explanation:
1. Create a policy to capture the privilege used by a user for privilege analysis.
3. Start analyzing the data captured by the policy.
6. Stop analyzing the data.
2. Generate a report with the data captured for a specified privilege capture.
5. Compare the used and unused privileges’ lists.
4. Revoke the unused privileges.



Leave a Reply 4

Your email address will not be published. Required fields are marked *


Grunthos

Grunthos

B is correct.

[1] Create,
[3] Begin Analysis,
[6] Stop Analysis,
[2] Generate Report,
[5] Compare,
[4] Revoke