Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 212-89 Topic 3 Question 46 Discussion

Actual exam question for Eccouncil's 212-89 exam
Question #: 46
Topic #: 3
[All 212-89 Questions]

An insider threat response plan helps an organization minimize the damage caused by malicious insiders. One of the approaches to mitigate these threats is setting up controls from the human resources department. Which of the following guidelines can the human resources department use?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Ozell
28 days ago
Wait, the HR department is responsible for insider threat response? I thought that was the IT team's job. Maybe they should just stick to hiring and firing people.
upvoted 0 times
Rosamond
11 days ago
They can also monitor employee behavior and report any suspicious activity to the IT team.
upvoted 0 times
...
Henriette
12 days ago
HR department can help by conducting thorough background checks on new hires.
upvoted 0 times
...
...
Casandra
30 days ago
Monitoring and securing the physical environment? That's the easy part. The real challenge is keeping the HR team from accidentally locking themselves out of the building.
upvoted 0 times
...
Laurena
1 months ago
A person-to-person rule for the backup process? That's just asking for trouble. What if the person in charge of backups decides to go rogue? Not a great idea.
upvoted 0 times
Raylene
3 days ago
A) Access granted to users should be documented and vetted by a supervisor.
upvoted 0 times
...
...
Pamella
1 months ago
Disabling the default administrative account? Hmm, that seems a bit overkill for an HR department. But I guess it could work if they're really paranoid.
upvoted 0 times
Rikki
8 days ago
C) Implement a person-to-person rule to secure the backup process and physical media.
upvoted 0 times
...
Rolland
19 days ago
B) Disable the default administrative account to ensure accountability.
upvoted 0 times
...
Louis
29 days ago
A) Access granted to users should be documented and vetted by a supervisor.
upvoted 0 times
...
...
Stefania
2 months ago
Access granted to users should definitely be documented and vetted by a supervisor. It's a simple and effective way to mitigate insider threats.
upvoted 0 times
Markus
15 hours ago
B) Disable the default administrative account to ensure accountability.
upvoted 0 times
...
Alethea
19 days ago
A) Access granted to users should be documented and vetted by a supervisor.
upvoted 0 times
...
Armanda
29 days ago
D) Monitor and secure the organization's physical environment.
upvoted 0 times
...
Edna
1 months ago
C) Implement a person-to-person rule to secure the backup process and physical media.
upvoted 0 times
...
Kimbery
1 months ago
B) Disable the default administrative account to ensure accountability.
upvoted 0 times
...
Kathryn
1 months ago
A) Access granted to users should be documented and vetted by a supervisor.
upvoted 0 times
...
...
Raylene
2 months ago
I believe option D is also important, monitoring the physical environment can help prevent insider threats.
upvoted 0 times
...
Chantell
2 months ago
I agree with Rory, documenting and vetting access is crucial for security.
upvoted 0 times
...
Rory
2 months ago
I think option A is a good guideline for HR to use.
upvoted 0 times
...
Francisca
2 months ago
I believe option D is also important, monitoring the physical environment can help prevent insider threats.
upvoted 0 times
...
Tamala
2 months ago
I agree with Sherell, documenting and vetting access is crucial for security.
upvoted 0 times
...
Sherell
2 months ago
I think option A is a good guideline for HR to use.
upvoted 0 times
...

Save Cancel