Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

APICS Certified in Planning and Inventory Management (CPIM 8.0) CPIM-8.0 Question # 47 Topic 5 Discussion

APICS Certified in Planning and Inventory Management (CPIM 8.0) CPIM-8.0 Question # 47 Topic 5 Discussion

CPIM-8.0 Exam Topic 5 Question 47 Discussion:
Question #: 47
Topic #: 5

Which approach will BEST mitigate risks associated with root user access while maintaining system functionality?


A.

Creating a system where administrative tasks are performed under monitored sessions using the root account, with audits conducted regularly


B.

Implementing a policy where users log in as root for complex tasks but use personal accounts for everyday activities, with strict logging of root access


C.

Configuring individual user accounts with necessary privileges for specific tasks and employing “sudo” for occasional administrative needs


D.

Allowing key authorized personnel to access the root account for critical system changes, while other staff use limited accounts with “sudo” for routine tasks


Get Premium CPIM-8.0 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.