subject

Asecurity administrator is developing controls for creating audit trails and tracking if a phi data breach is to
occur. the administrator has been given the following requirements:
*all access must be correlated to a user account.
*all user accounts must be assigned to a single individual.
*user access to the phi data must be recorded.
*anomalies in phi data access must be reported.
*logs and records cannot be deleted or modified.
which of the following should the administrator implement to meet the above requirements? (select three).
a. eliminate shared accounts.
b. create a standard naming convention for accounts.
c. implement usage auditing and review.
d. enable account lockout thresholds.
e. copy logs in real time to a secured worm drive.
f. implement time-of-day restrictions.
g. perform regular permission audits and reviews..
a. eliminate shared accounts
c. implement usage auditing and review
e. copy logs in real time to secured worm drive

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 06:00
Respond to the following in three to five sentences. select the workplace skill, habit, or attitude described in this chapter that you believe is most important for being a successful employee.
Answers: 1
question
Computers and Technology, 24.06.2019 00:00
Visualizing a game of “tag” to remember the meaning of contagious
Answers: 3
question
Computers and Technology, 24.06.2019 04:30
The ieee 802.11: defines standards for wireless local area network (wlan) communication protocols. identifies various computers or devices connected to a network. verifies any resource attached to another computer on a network that is different from the computer to which the user is logged on. connects multiple local area networks (lans) and wide area networks (wans).
Answers: 2
question
Computers and Technology, 25.06.2019 15:00
When microsoft excel is first opened, where will its content come from?
Answers: 1
You know the right answer?
Asecurity administrator is developing controls for creating audit trails and tracking if a phi data...
Questions