ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 676 - N10-008 discussion

Report
Export

A software developer changed positions within a company and is now a sales engineer. The security team discovered that the former software developer had been modifying code to implement small features requested by customers. Which of the following would be the best thing for the security administrator to implement to prevent this from happening?

A.
A software patching policy
Answers
A.
A software patching policy
B.
A role-based access control policy
Answers
B.
A role-based access control policy
C.
Firewalls on the software development servers
Answers
C.
Firewalls on the software development servers
D.
Longer and more complex password requirements
Answers
D.
Longer and more complex password requirements
Suggested answer: B

Explanation:

A role-based access control (RBAC) policy is a security measure that assigns permissions and privileges to users based on their roles and responsibilities within an organization. RBAC helps to enforce the principle of least privilege, which states that users should only have the minimum level of access required to perform their tasks. RBAC also helps to prevent unauthorized access, modification, or misuse of sensitive data or resources by limiting the scope and impact of user actions.

A software patching policy, firewalls on the software development servers, and longer and more complex password requirements are all good security practices, but they do not directly address the issue of preventing the former software developer from modifying code. A software patching policy ensures that software is updated regularly to fix bugs and vulnerabilities, but it does not prevent a user from introducing new code changes. Firewalls on the software development servers protect the servers from external attacks, but they do not prevent a user from accessing the servers internally. Longer and more complex password requirements make it harder for attackers to guess or crack passwords, but they do not prevent a user from using their own valid credentials.

Reference

1: Role-Based Access Control (RBAC) - Definition and Examples

2: Network+ (Plus) Certification | CompTIA IT Certifications

3: [What is the Principle of Least Privilege? - Definition from Techopedia]

asked 02/10/2024
Fthcx Fgghn
33 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first