FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

COMPUTER SECURITY POLICIES EXAMPLES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Allows a system administrator to set up a hierarchy of users
A
Firewall
B
Network forensics
C
User access levels
D
Passwords
Explanation: 

Detailed explanation-1: -The main responsibility of the system administrator is to control access to the application and to ensure that operations are secure and efficient. This chapter specifically covers the following topics: Creation of users. Registering these users in the application.

Detailed explanation-2: -A security administrator installs, administers, and troubleshoots an organization’s security solutions. The security administrator will ensure the network’s security, protect against unauthorized access, modification, or destruction, and troubleshoot any access problems.

Detailed explanation-3: -The security administrator is responsible for the following tasks: Assigning and modifying the security attributes of a user, role, or rights profile. Creating and modifying rights profiles. Assigning rights profiles to a user or role.

Detailed explanation-4: -The user has to be defined as “User Management Admin” in the system using Role Based Access Control(RBAC). The Functional Administrator need to grant the below menu navigation & permission sets to have access. Now the user has access to User Management responsibility menu.

There is 1 question to complete.