Suggested Answer:Answer: D🗳️
Under the principle of separation of duties, an operator should not be performing data entry. This should be left to data entry personnel. System operators represent a class of users typically found in data center environments where mainframe systems are used. They provide day-to-day operations of the mainframe environment, ensuring that scheduled jobs are running effectively and troubleshooting problems that may arise. They also act as the arms and legs of the mainframe environment, load and unloading tape and results of job print runs. Operators have elevated privileges, but less than those of system administrators. If misused, these privileges may be used to circumvent the systems security policy. As such, use of these privileges should be monitored through audit logs. Some of the privileges and responsibilities assigned to operators include: Implementing the initial program load: This is used to start the operating system. The boot process or initial program load of a system is a critical time for ensuring system security. Interruptions to this process may reduce the integrity of the system or cause the system to crash, precluding its availability. Monitoring execution of the system: Operators respond to various events, to include errors, interruptions, and job completion messages. Volume mounting: This allows the desired application access to the system and its data. Controlling job flow: Operators can initiate, pause, or terminate programs. This may allow an operator to affect the scheduling of jobs. Controlling job flow involves the manipulation of configuration information needed by the system. Operators with the ability to control a job or application can cause output to be altered or diverted, which can threaten the confidentiality. Bypass label processing: This allows the operator to bypass security label information to run foreign tapes (foreign tapes are those from a different data center that would not be using the same label format that the system could run). This privilege should be strictly controlled to prevent unauthorized access. Renaming and relabeling resources: This is sometimes necessary in the mainframe environment to allow programs to properly execute. Use of this privilege should be monitored, as it can allow the unauthorized viewing of sensitive information. Reassignment of ports and lines: Operators are allowed to reassign ports or lines. If misused, reassignment can cause program errors, such as sending sensitive output to an unsecured location. Furthermore, an incidental port may be opened, subjecting the system to an attack through the creation of a new entry point into the system. Reference(s) used for this question: Hernandez CISSP, Steven (2012-12-21). Official (ISC)2 Guide to the CISSP CBK, Third Edition ((ISC)2 Press) (Kindle Locations 19367-19395). Auerbach Publications. Kindle Edition. Which of the following should be performed by an operator?
A. Changing profiles -
B. Approving changes -
C. Adding and removal of users -
D. Installing system software - Of the listed tasks, installing system software is the only task that should normally be performed by an operator in a properly segregated environment. Source: MOSHER, Richard & ROTHKE, Ben, CISSP CBK Review presentation on domain 7.
Performing the initial program load (IPL) is typically not a task assigned to an operator. IPL involves loading the operating system or initial programs into the computer's memory when it's powered up or restarted. This task is usually handled by system administrators, specialized personnel, or automated processes rather than operators.
So, the task that should NOT be performed by an operator among the options provided is:
A. Implementing the initial program load (IPL).
Implementing the initial program load involves the installation and loading of the initial programs and operating system on a computer system. This task is typically performed by system administrators or individuals responsible for system setup and configuration
From the explanation, the right answer should be C
upvoted 4 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
nanson
1 year agoStevovo123
1 year agoHenlo378
2 years, 1 month agoSteroidalRED
2 years, 2 months agoYupata
3 years, 2 months agoStaanlee
4 years, 2 months ago