Identify the correct sequence of steps.

Examine the following steps of privilege analysis for checking and revoking excessive, unused privileges
granted to users:
1. Create a policy to capture the privilege used by a user for privilege analysis.
2. Generate a report with the data captured for a specified privilege capture.
3. Start analyzing the data captured by the policy.
4. Revoke the unused privileges.
5. Compare the used and unused privileges` lists.
6. Stop analyzing the data.
Identify the correct sequence of steps.

Examine the following steps of privilege analysis for checking and revoking excessive, unused privileges
granted to users:
1. Create a policy to capture the privilege used by a user for privilege analysis.
2. Generate a report with the data captured for a specified privilege capture.
3. Start analyzing the data captured by the policy.
4. Revoke the unused privileges.
5. Compare the used and unused privileges` lists.
6. Stop analyzing the data.
Identify the correct sequence of steps.

A.
1, 3, 5, 6, 2, 4

B.
1, 3, 6, 2, 5, 4

C.
1, 3, 2, 5, 6, 4

D.
1, 3, 2, 5, 6, 4

E.
1, 3, 5, 2, 6, 4

Explanation:
1. Create a policy to capture the privilege used by a user for privilege analysis.
3. Start analyzing the data captured by the policy.
6. Stop analyzing the data.
2. Generate a report with the data captured for a specified privilege capture.
5. Compare the used and unused privileges` lists.
4. Revoke the unused privileges.



Leave a Reply 0

Your email address will not be published. Required fields are marked *