Examine the following steps of privilege analysis for checking and revoking excessive, unused privileges
granted to users:
1. Create a policy to capture the privilege used by a user for privilege analysis.
2. Generate a report with the data captured for a specified privilege capture.
3. Start analyzing the data captured by the policy.
4. Revoke the unused privileges.
5. Compare the used and unused privileges` lists.
6. Stop analyzing the data.
Identify the correct sequence of steps.
A.
1, 3, 5, 6, 2, 4
B.
1, 3, 6, 2, 5, 4
C.
1, 3, 2, 5, 6, 4
D.
1, 3, 2, 5, 6, 4
E.
1, 3, 5, 2, 6, 4
Explanation:
1. Create a policy to capture the privilege used by a user for privilege analysis.
3. Start analyzing the data captured by the policy.
6. Stop analyzing the data.
2. Generate a report with the data captured for a specified privilege capture.
5. Compare the used and unused privileges` lists.
4. Revoke the unused privileges.