Posted by: Pdfprep
Post Date: October 20, 2020
A security administrator is developing controls for creating audit trails and tracking if a PHI data breach is to occur. The administrator has been given the following requirements:
Which of the following should the administrator implement to meet the above requirements? (Select three.)
A . Eliminate shared accounts.
B . Create a standard naming convention for accounts.
C . Implement usage auditing and review.
D . Enable account lockout thresholds.
E . Copy logs in real time to a secured WORM drive.
F . Implement time-of-day restrictions.
G . Perform regular permission audits and reviews.
Answer: A,C,G
Leave a Reply