List of questions
Related questions
Question 12 - NSE6_FSR-7.3 discussion
A security analyst has reported unauthorized access to System Configuration. You must review the user's current level of access, and then restrict their access according to your organization's requirements. As part of your auditing process, which two actions should you perform? (Choose two.)
A.
Remove the create, read, update, and delete (CRUD) permissions or roles that the user does not require.
B.
View the user's effective role permissions, and then investigate which role is providing that access.
C.
Remove all record ownership that is assigned to the user.
D.
Review the user's learn hierarchy to ensure that the appropriate relationships are configured.
Your answer:
0 comments
Sorted by
Leave a comment first