• Post author:
  • Post category:Blog
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

When a security audit is performed at a company, the auditor reports that new users have access to network resources beyond their normal job roles. Additionally, users who move to different positions retain their prior permissions. What kind of violation is occurring?

  • network policy
  • least privilege
  • audit
  • password
Answers Explanation & Hints:

Users should have access to information on a need to know basis. When a user moves from job role to job role, the same concept applies.

For more Questions and Answers:

CyberOps Associate 1.02 & CA v1.0 Modules 18 – 20: Network Defense Group Exam Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments