A security analyst has received information from a third-party intelligence-sharing resource that indicates employee accounts were breached. Which of the following is the NEXT step the analyst should take to address the issue?
A) Audit access permissions for all employees to ensure least privilege.
B) Force a password reset for the impacted employees and revoke any tokens.
C) Configure SSO to prevent passwords from going outside the local network.
D) Set up privileged access management to ensure auditing is enabled.
Correct Answer:
Verified
Q29: As part of an exercise set up
Q30: An incident responder successfully acquired application binaries
Q31: Bootloader malware was recently discovered on several
Q32: For machine learning to be applied effectively
Q33: A Chief Information Security Officer (CISO) is
Q35: A network attack that is exploiting a
Q36: Which of the following BEST describes the
Q37: A product manager is working with an
Q38: A security analyst is reviewing a web
Q39: During routine monitoring, a security analyst discovers
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents