CERTIFIED-IN-CYBERSECURITY · Question #102
CERTIFIED-IN-CYBERSECURITY Question #102: Real Exam Question with Answer & Explanation
The correct answer is A: Trust but verify. The "Trust but verify" model is a method of threat protection that involves granting privileged accounts access to the network and other resources, while at the same time verifying their actions and activities. However, over time, this model was found to have limitations that exp
Question
Which of these is NOT a best practice in access management? ()
Options
- ATrust but verify
- BPeriodically assessing whether user permissions still apply
- CGiving only the right amount of permission
- DRequesting a justification when upgrading permission
Explanation
The "Trust but verify" model is a method of threat protection that involves granting privileged accounts access to the network and other resources, while at the same time verifying their actions and activities. However, over time, this model was found to have limitations that expose organizations to a wide array of security threats. Therefore, "Trust but verify" is being progressively abandoned in favor of the Zero Trust model. The remaining options are all best practices of access management.
Topics
Community Discussion
No community discussion yet for this question.