A security administrator is developing controls for creating audit trails and tracking if a PHI data breach is to occur. The administrator has been given the following requirements: All access must be correlated to a user account. All user accounts must be assigned to a single individual. User access to the PHI data must be recorded. Anomalies in PHI data access must be reported. Logs and records cannot be deleted or modified. Which of the following should the administrator implement to meet the above requirements? (Select three.)
A) Eliminate shared accounts.
B) Create a standard naming convention for accounts.
C) Implement usage auditing and review.
D) Enable account lockout thresholds.
E) Copy logs in real time to a secured WORM drive.
F) Implement time-of-day restrictions.
G) Perform regular permission audits and reviews.
Correct Answer:
Verified
Q717: Which of the following technologies would be
Q718: Which of the following BEST describes an
Q719: An administrator discovers the following log entry
Q720: Which of the following best describes the
Q721: A network technician is trying to determine
Q723: Which of the following allows an application
Q724: A company would like to prevent the
Q725: While reviewing the security controls in place
Q726: During a recent audit, it was discovered
Q727: A security administrator has been asked to
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents