subject

Asecurity administrator is developing controls for creating audit trails and tracking if a phi data breach is to
occur. the administrator has been given the following requirements:
*all access must be correlated to a user account.
*all user accounts must be assigned to a single individual.
*user access to the phi data must be recorded.
*anomalies in phi data access must be reported.
*logs and records cannot be deleted or modified.
which of the following should the administrator implement to meet the above requirements? (select three).
a. eliminate shared accounts.
b. create a standard naming convention for accounts.
c. implement usage auditing and review.
d. enable account lockout thresholds.
e. copy logs in real time to a secured worm drive.
f. implement time-of-day restrictions.
g. perform regular permission audits and reviews..
a. eliminate shared accounts
c. implement usage auditing and review
e. copy logs in real time to secured worm drive

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 01:00
Let r be a robotic arm with a fixed base and seven links. the last joint of r is a prismatic joint, the other ones are revolute joints. give a set of parameters that determines a placement of r. what is the dimension of the configuration space resulting from your choice of parameters?
Answers: 3
question
Computers and Technology, 23.06.2019 10:50
Your friend kayla is starting her own business and asks you whether she should set it up as a p2p network or as a client-server network. list three questions you might ask to kayla decide which network to use and how her answers to those questions would affect your recommendation.
Answers: 2
question
Computers and Technology, 23.06.2019 12:40
Curriculum exam to process a resident's payment, you must click on onesite payments home page. from the a. reports b. my settings o c.transactions o d. rent tab
Answers: 1
question
Computers and Technology, 23.06.2019 18:00
What can a word user do with the customize ribbon dialog box? check all that apply. minimize the ribbon add a new tab to the ribbon remove a group from a tab add a group to a tab choose which styles appear choose which fonts appear choose tools to appear in a group
Answers: 1
You know the right answer?
Asecurity administrator is developing controls for creating audit trails and tracking if a phi data...
Questions
question
Mathematics, 11.05.2021 16:20
question
History, 11.05.2021 16:30
Questions on the website: 13722361