APICS Certified in Planning and Inventory Management (CPIM 8.0) CPIM-8.0 Question # 47 Topic 5 Discussion
CPIM-8.0 Exam Topic 5 Question 47 Discussion:
Question #: 47
Topic #: 5
Which approach will BEST mitigate risks associated with root user access while maintaining system functionality?
A.
Creating a system where administrative tasks are performed under monitored sessions using the root account, with audits conducted regularly
B.
Implementing a policy where users log in as root for complex tasks but use personal accounts for everyday activities, with strict logging of root access
C.
Configuring individual user accounts with necessary privileges for specific tasks and employing “sudo” for occasional administrative needs
D.
Allowing key authorized personnel to access the root account for critical system changes, while other staff use limited accounts with “sudo” for routine tasks
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit