You wish to hide the 1- Critical priority incidents for ITIL users viewing the dashboard. Select the required breakdown source configuration.

Prepare for the CIS-PA exam with our comprehensive study resources. Master multiple choice questions and gain crucial insights. Ensure your success today!

The correct choice involves employing a blacklist security type specifically targeting the role of ITIL users with the intent of hiding the incidents classified as "1-Critical." By selecting a blacklist configuration for the specified role, the dashboard effectively restricts visibility of those critical priority incidents for the ITIL users.

In this context, the breakdown source configuration identifies which elements (in this case, incidents) can be filtered out based on certain security policies. Choosing a blacklist approach allows you to specify exactly which elements should be excluded from view, addressing the need to hide just the 1-Critical incidents without affecting the visibility of incidents with other priorities.

The other configurations either do not focus on the specific exclusion of critical incidents for the ITIL role or use a whitelist approach, which permits visibility of other elements instead of restricting it. Whitelisting typically allows everything except explicitly blocked items, thereby not effectively achieving the goal of hiding only the critical incidents. In essence, the chosen configuration directly aligns with the requirement to restrict ITIL users from viewing specific high-priority incidents without inadvertently granting access to more prioritized incidents.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy