ExamQuestions.com

Register
Login
CompTIA Security+ Exam Questions

CompTIA

CompTIA Security+

37 / 570

Question 37:

A security administrator is developing controls for creating audit trails and tracking if a PHI data breach is to occur. The administrator has been given the following requirements: All access must be correlated to a user account. 
image
✑ All user accounts must be assigned to a single individual. ✑ User access to the PHI data must be recorded. ✑ Anomalies in PHI data access must be reported. ✑ Logs and records cannot be deleted or modified. Which of the following should the administrator implement to meet the above requirements? (Choose three.) 

Answer options:

A. Eliminate shared accounts.
B. Create a standard naming convention for accounts.
C. Implement usage auditing and review.
D. Enable account lockout thresholds.
E. Copy logs in real time to a secured WORM drive.
F. Implement time-of-day restrictions.
G. Perform regular permission audits and reviews.