How is account provisioning commonly accomplished?

A. Assign all users a random number-based name.
B. Grant each user full spectrum privileges.
C. Compartmentalize users into their own individual area of assignment.
D. Create user groups based on assigned company department or job responsibility.


Answer: D. Create user groups based on assigned company department or job responsibility.

Computer Science & Information Technology

You might also like to view...

You can press the ____ key to cycle a selected cell reference from a relative reference to an absolute reference to a mixed reference with an absolute row to a mixed reference with an absolute column and back to a relative reference.

A. F1 B. F2 C. F3 D. F4

Computer Science & Information Technology

Every open port on a router is a possible avenue of entry for a malware or intruder

Indicate whether the statement is true or false.

Computer Science & Information Technology

A(n) _____ method is a technique that uses accounting entries to allocate the indirect costs of running an IT department.

A.  annuity B.  feedback C.  chargeback D.  acquisition 

Computer Science & Information Technology

In a buffer overflow attack, an attacker finds a vulnerability in poorly written code that doesn't check for a defined amount of memory space use.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology