ExamGecko
Question list
Search
Search

Question 599 - CISM discussion

Report
Export

Which of the following is the MOST effective defense against malicious insiders compromising confidential information?

A.
Regular audits of access controls
Answers
A.
Regular audits of access controls
B.
Strong background checks when hiring staff
Answers
B.
Strong background checks when hiring staff
C.
Prompt termination procedures
Answers
C.
Prompt termination procedures
D.
Role-based access control (RBAC)
Answers
D.
Role-based access control (RBAC)
Suggested answer: D

Explanation:

role-based access control (RBAC) is the most effective defense against malicious insiders compromising confidential information, as it helps to limit the access of users to the information and resources that are necessary for their roles and responsibilities. RBAC also helps to enforce the principle of least privilege, which reduces the risk of unauthorized or inappropriate access, disclosure, modification, or destruction of information by insiders. RBAC also facilitates the monitoring and auditing of user activities and access rights.

Reference=Malicious insiders | Cyber.gov.au,Insider Threat Mitigation Guide - CISA,Malicious Insiders: Types, Indicators & Common Techniques - Ekran System

asked 01/10/2024
Gregory Pollack
32 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first