nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #38

CERTIFIED-IN-CYBERSECURITY Question #38: Real Exam Question with Answer & Explanation

The correct answer is D: External Worker. Typically, external workers should not have access to privileged accounts, due to the possibility of misuse. The Help Desk (or IT Support Staff) may have to view or manipulate endpoints, servers and applications platforms using privileged or restricted operations. Security analys

Access Controls Concepts

Question

Which of these types of user is LESS likely to have a privileged account?

Options

  • AHelp Desk
  • BSecurity Analyst
  • CSystem Administrator
  • DExternal Worker

Explanation

Typically, external workers should not have access to privileged accounts, due to the possibility of misuse. The Help Desk (or IT Support Staff) may have to view or manipulate endpoints, servers and applications platforms using privileged or restricted operations. Security analysts may require fast access to the IT infrastructure, systems, endpoints and data environment. By definition, systems administrators require privileged accounts, since they are responsible for operating systems, deploying applications, and managing performance.

Topics

#Privileged Access#Access Control#User Roles#Least Privilege

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions