New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Isaca Certified Information Security Manager CISM Question # 36 Topic 4 Discussion

Isaca Certified Information Security Manager CISM Question # 36 Topic 4 Discussion

CISM Exam Topic 4 Question 36 Discussion:
Question #: 36
Topic #: 4

Which of the following is the BEST approach for data owners to use when defining access privileges for users?

Define access privileges based on user roles.

Adopt user account settings recommended by the vendor.

Perform a risk assessment of the users' access privileges.


A.

Implement an identity and access management (IDM) tool.


Get Premium CISM Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.