Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CSA Exam CCSK Topic 4 Question 81 Discussion

Actual exam question for CSA's CCSK exam
Question #: 81
Topic #: 4
[All CCSK Questions]

Which practice best helps mitigate security risks by minimizing root/core access and restricting deployment creation?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Herminia
2 months ago
Wow, B really stands out as the 'dumb' answer here. Disabling MFA? What were they thinking?
upvoted 0 times
Izetta
19 days ago
C) Deploying applications with full access and applying restrictions based on the need to object
upvoted 0 times
...
Burma
23 days ago
D) Enforcing the principle of least privilege
upvoted 0 times
...
Jamal
1 months ago
A) Enforcing the principle of trust and eventually verily on demand
upvoted 0 times
...
...
Eliseo
2 months ago
C is way too permissive. Giving full access and then restricting it later? That's not how you do security right.
upvoted 0 times
Clement
1 months ago
C is way too permissive. Giving full access and then restricting it later? That's not how you do security right.
upvoted 0 times
...
Mohammad
1 months ago
D) Enforcing the principle of least privilege
upvoted 0 times
...
Shawna
2 months ago
A) Enforcing the principle of trust and eventually verily on demand
upvoted 0 times
...
...
Henriette
2 months ago
B is just plain wrong. Disabling multi-factor authentication is the opposite of what we should be doing.
upvoted 0 times
Myra
1 months ago
A) Enforcing the principle of trust and eventually verily on demand
upvoted 0 times
...
Maddie
1 months ago
D) Enforcing the principle of least privilege
upvoted 0 times
...
Janella
2 months ago
A) Enforcing the principle of trust and eventually verily on demand
upvoted 0 times
...
...
Merilyn
3 months ago
I'm not sure about the 'trust and eventually verify' thing in A. That sounds like a recipe for disaster when it comes to security.
upvoted 0 times
Na
2 months ago
C) Deploying applications with full access and applying restrictions based on the need to object
upvoted 0 times
...
Rosann
3 months ago
A) Enforcing the principle of least privilege
upvoted 0 times
...
...
Nieves
3 months ago
Option D definitely sounds like the best approach. Enforcing the principle of least privilege is crucial for minimizing security risks.
upvoted 0 times
...
Louvenia
3 months ago
I'm not sure, but I think deploying applications with full access and applying restrictions based on the need to object could also be effective.
upvoted 0 times
...
Jaime
3 months ago
I agree with Gearldine, limiting access can help minimize security risks.
upvoted 0 times
...
Gearldine
4 months ago
I think the best practice is enforcing the principle of least privilege.
upvoted 0 times
...

Save Cancel