Question 73:
Examine the following steps of privilege analysis for checking and revoking excessive, unused privileges granted to users: 1. Create a policy to capture the privileges used by a user for privilege analysis. 2. Generate a report with the data captured for a specified privilege capture. 3.Start analyzing the data captured by the policy. 4.Revoke the unused privileges. 5. Compare the used and unused privileges` lists. 6. Stop analyzing the data. Identify the correct sequence of steps.
Answer options:
A. 1, 3, 5, 6, 2, 4 B. 1, 3, 6, 2, 5, 4 C. 1, 3, 2, 5, 6, 4 D. 1, 3, 5, 2, 6, 4