Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Fortinet NSE 6 - FortiSOAR 7.3 Administrator NSE6_FSR-7.3 Question # 10 Topic 2 Discussion

Fortinet NSE 6 - FortiSOAR 7.3 Administrator NSE6_FSR-7.3 Question # 10 Topic 2 Discussion

NSE6_FSR-7.3 Exam Topic 2 Question 10 Discussion:
Question #: 10
Topic #: 2

A security analyst has reported unauthorized access to System Configuration. You must review the user's current level of access, and then restrict their access according to your organization's requirements. As part of your auditing process, which two actions should you perform? (Choose two.)


A.

Remove the create, read, update, and delete (CRUD) permissions or roles that the user does not require.


B.

View the user's effective role permissions, and then investigate which role is providing that access.


C.

Remove all record ownership that is assigned to the user.


D.

Review the user's learn hierarchy to ensure that the appropriate relationships are configured.


Get Premium NSE6_FSR-7.3 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.