ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 183 - SY0-701 discussion

Report
Export

A systems administrator is working on a defense-in-depth strategy and needs to restrict activity from employees after hours. Which of the following should the systems administrator implement?

A.
Role-based restrictions
Answers
A.
Role-based restrictions
B.
Attribute-based restrictions
Answers
B.
Attribute-based restrictions
C.
Mandatory restrictions
Answers
C.
Mandatory restrictions
D.
Time-of-day restrictions
Answers
D.
Time-of-day restrictions
Suggested answer: D

Explanation:

To restrict activity from employees after hours, the systems administrator should implement time-of-day restrictions. This method allows access to network resources to be limited to specific times, ensuring that employees can only access systems during approved working hours. This is an effective part of a defense-in-depth strategy to mitigate risks associated with unauthorized access during off-hours, which could be a time when security monitoring might be less stringent.

Time-of-day restrictions: These control access based on the time of day, preventing users from logging in or accessing certain systems outside of designated hours.

Role-based restrictions: Control access based on a user's role within the organization.

Attribute-based restrictions: Use various attributes (such as location, department, or project) to determine access rights.

Mandatory restrictions: Typically refer to non-discretionary access controls, such as those based on government or organizational policy.

asked 02/10/2024
Kareem Dadoul
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first