Which technique helps mitigate insider threats?

Study for the DSAC-11 Annex C Test with real-time quizzes and multiple-choice questions. Each question offers hints and explanations to enhance your preparedness. Boost your confidence and ensure success in your DSAC-11 Annex C exam!

Multiple Choice

Which technique helps mitigate insider threats?

Explanation:
Limiting access to the minimum privileges needed for each user reduces the potential damage insiders can cause. When people only have the rights necessary for their role, even if an account is misused or compromised, there’s less data or systems exposed. This approach supports strong access controls, such as role-based access and regular reviews, and it makes unusual activity easier to detect because permissions are tightly scoped and change over time with roles. Increasing the network perimeter mainly helps against external threats and can be bypassed by insiders or compromised internal accounts, so it doesn’t specifically address insider risk. Frequent password changes don’t directly reduce what a person can do; they can be ineffective or burdensome if not paired with proper access controls. Public sharing of credentials is dangerous and greatly increases risk by removing accountability and enabling broader access.

Limiting access to the minimum privileges needed for each user reduces the potential damage insiders can cause. When people only have the rights necessary for their role, even if an account is misused or compromised, there’s less data or systems exposed. This approach supports strong access controls, such as role-based access and regular reviews, and it makes unusual activity easier to detect because permissions are tightly scoped and change over time with roles.

Increasing the network perimeter mainly helps against external threats and can be bypassed by insiders or compromised internal accounts, so it doesn’t specifically address insider risk. Frequent password changes don’t directly reduce what a person can do; they can be ineffective or burdensome if not paired with proper access controls. Public sharing of credentials is dangerous and greatly increases risk by removing accountability and enabling broader access.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy