A security administrator is developing controls for creating audit trails and tracking if a PHI data breach is to occur. The administrator has been given the following requirements: All access must be correlated to a user account. All user accounts must be assigned to a single individual. User access to the PHI data must be recorded. Anomalies in PHI data access must be reported. Logs and records cannot be deleted or modified. Which of the following should the administrator implement to meet the above requirements? (Choose three.)
A) Eliminate shared accounts.
B) Create a standard naming convention for accounts.
C) Implement usage auditing and review.
D) Enable account lockout thresholds.
E) Copy logs in real time to a secured WORM drive.
F) Implement time-of-day restrictions.
G) Perform regular permission audits and reviews.
Correct Answer:
Verified
Q16: A company determines that it is prohibitively
Q17: In a corporation where compute utilization spikes
Q18: Despite having implemented password policies, users continue
Q19: A security engineer is configuring a system
Q20: Which of the following best describes routine
Q22: Malicious traffic from an internal network has
Q23: A high-security defense installation recently begun utilizing
Q24: A company's user lockout policy is enabled
Q25: When configuring settings in a mandatory access
Q26: A company has a data classification system
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents