Identify the correct sequence of steps

Examine the following steps of privilege analysis for checking and revoking excessive, unused privileges granted to users:

1) Create a policy to capture the privileges used by a user for privilege analysis.
2) Generate a report with the data captured for a specified privilege capture.
3) Start analyzing the data captured by the policy.
4) Revoke the unused privileges.
5) Compare the used and unused privileges’ lists.
6) Stop analyzing the data.

Identify the correct sequence of steps.

Examine the following steps of privilege analysis for checking and revoking excessive, unused privileges granted to users:

1) Create a policy to capture the privileges used by a user for privilege analysis.
2) Generate a report with the data captured for a specified privilege capture.
3) Start analyzing the data captured by the policy.
4) Revoke the unused privileges.
5) Compare the used and unused privileges’ lists.
6) Stop analyzing the data.

Identify the correct sequence of steps.

A.
1, 3, 5, 6, 2, 4

B.
1, 3, 6, 2, 5, 4

C.
1, 3, 2, 5, 6, 4

D.
1, 3, 5, 2, 6, 4



Leave a Reply 4

Your email address will not be published. Required fields are marked *