Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CertNexus Exam CFR-410 Topic 8 Question 24 Discussion

Actual exam question for CertNexus's CFR-410 exam
Question #: 24
Topic #: 8
[All CFR-410 Questions]

According to company policy, all accounts with administrator privileges should have suffix _j

a. While reviewing Windows workstation configurations, a security administrator discovers an account without the suffix in the administrator's group. Which of the following actions should the security administrator take?

Show Suggested Answer Hide Answer
Suggested Answer: A, B

Contribute your Thoughts:

Reena
14 days ago
This question is a real 'suffix-cation' of my security knowledge! I better choose wisely or I'll be in the 'admin-istrative' doghouse.
upvoted 0 times
...
Floyd
17 days ago
I'm going to review the security log on the domain controller. That's where I'll find the most relevant information about this policy violation.
upvoted 0 times
...
Janella
18 days ago
Wait, why would I review the system log on a domain controller? Shouldn't I be looking at the security log on the affected workstation to find out what's going on?
upvoted 0 times
...
Hester
1 months ago
Hmm, the security log on the affected workstation might give me some clues about how this account ended up without the required suffix. I'll go with option D.
upvoted 0 times
Alesia
4 days ago
I think reviewing the system log on the affected workstation could also provide some insights. Option A might be worth considering.
upvoted 0 times
...
Tish
8 days ago
I agree, checking the security log on the affected workstation is a good idea. Let's go with option D.
upvoted 0 times
...
...
Roosevelt
1 months ago
This is a tricky one. I think I'd better review the security log on the domain controller to see if there are any unauthorized access attempts.
upvoted 0 times
Shizue
8 days ago
C) Review the system log on a domain controller.
upvoted 0 times
...
Buck
13 days ago
B) Review the security log on a domain controller.
upvoted 0 times
...
Lizette
17 days ago
A) Review the system log on the affected workstation.
upvoted 0 times
...
...
Ryan
2 months ago
I believe reviewing the system log on the affected workstation could also provide valuable information about the account without the suffix.
upvoted 0 times
...
Joanna
2 months ago
I agree with Tasia. Checking the security log on the affected workstation would help identify any unauthorized activity.
upvoted 0 times
...
Tasia
2 months ago
I think the security administrator should review the security log on the affected workstation.
upvoted 0 times
...

Save Cancel