ExamGecko
Question list
Search
Search

Question 12 - NSE6_FSR-7.3 discussion

Report
Export

A security analyst has reported unauthorized access to System Configuration. You must review the user's current level of access, and then restrict their access according to your organization's requirements. As part of your auditing process, which two actions should you perform? (Choose two.)

A.

Remove the create, read, update, and delete (CRUD) permissions or roles that the user does not require.

Answers
A.

Remove the create, read, update, and delete (CRUD) permissions or roles that the user does not require.

B.

View the user's effective role permissions, and then investigate which role is providing that access.

Answers
B.

View the user's effective role permissions, and then investigate which role is providing that access.

C.

Remove all record ownership that is assigned to the user.

Answers
C.

Remove all record ownership that is assigned to the user.

D.

Review the user's learn hierarchy to ensure that the appropriate relationships are configured.

Answers
D.

Review the user's learn hierarchy to ensure that the appropriate relationships are configured.

Suggested answer: B, D

Explanation:

To audit and restrict a user's access within FortiSOAR, particularly in response to unauthorized access reports, it's necessary to review the user's effective role permissions. This involves checking which roles grant the user access to the System Configuration module and adjusting as needed. Additionally, reviewing the user's team hierarchy ensures that the user's access aligns with the organization's policies. Misconfigurations in team relationships can sometimes inadvertently provide elevated access; hence, confirming that the team setup is correct is a critical part of the auditing process.

asked 12/10/2024
Victor Armando Sánchez
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first