Validating Offboarding Process for Employees Supporting a New Government Contract | Exam SY0-601

Validating Offboarding Process

Prev Question Next Question

Question

A company has won an important government contract.

Several employees have been transferred from their existing projects to support a new contract.

Some of the employees who have transferred will be working long hours and still need access to their project information to transition work to their replacements.

Which of the following should be implemented to validate that the appropriate offboarding process has been followed?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

C.

The most appropriate measure to validate that the appropriate offboarding process has been followed would be "Permission auditing."

Permission auditing is a process that enables an organization to review and validate the access rights of its users. It helps organizations to identify and correct potential security risks by providing visibility into who has access to what resources.

In the scenario given, the employees who have been transferred to support a new contract will still need access to their project information to transition work to their replacements. However, it's essential to ensure that they only have access to the necessary information and that their access is terminated appropriately once their tasks are completed.

By implementing permission auditing, the organization can ensure that employees only have access to the information necessary to complete their work. It also enables the organization to track user activity and identify any unauthorized access attempts.

Separation of duties is a concept that separates critical tasks among different personnel to prevent conflicts of interest and fraud. It is not relevant to the given scenario.

Time-of-day restrictions limit user access to specific times of the day, which is not relevant to the scenario.

Mandatory Access Control (MAC) is a security model that assigns access levels to resources based on the security clearance of users. It is a useful control for highly classified environments, but it is not relevant to the given scenario.