Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil EC Council Certified Incident Handler (ECIH v3) 212-89 Question # 89 Topic 9 Discussion

ECCouncil EC Council Certified Incident Handler (ECIH v3) 212-89 Question # 89 Topic 9 Discussion

212-89 Exam Topic 9 Question 89 Discussion:
Question #: 89
Topic #: 9

A logistics company relying heavily on cloud-based inventory management discovered unauthorized activity initiated by a third-party contractor. The investigation revealed that the contractor's login was reused across multiple departments and lacked any tracking mechanism or role-specific restrictions to limit its scope. What cloud security best practice should be implemented to prevent such violations?


A.

Enforcement of strict user access control and credential isolation


B.

Use of anonymized data during inventory analytics


C.

Routine vulnerability scans on mobile apps used by delivery teams


D.

Implementation of Secure Sockets Layer (SSL) encryption on internal systems


Get Premium 212-89 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.