Comp TIA Security + Certification Questions Part 1
© examsiri.com
Question : 7 of 60
Marks:
+1,
-0
A security administrator is developing controls for creating audit trails and tracking if a PHI data breach is to occur. The administrator has been given the following requirements:
● All access must be correlated to a user account.
● All user accounts must be assigned to a single individual.
● User access to the PHI data must be recorded.
● Anomalies in PHI data access must be reported.
● Logs and records cannot be deleted or modified.
Which of the following should the administrator implement to meet the above requirements? (Select three.)
● All access must be correlated to a user account.
● All user accounts must be assigned to a single individual.
● User access to the PHI data must be recorded.
● Anomalies in PHI data access must be reported.
● Logs and records cannot be deleted or modified.
Which of the following should the administrator implement to meet the above requirements? (Select three.)
Go to Question: