A security analyst had received information from a third-party intelligence-sharing resource that indicates employee accounts were breached. Which of the following is the NEXT step the analyst should take to address the issue?

A. Audit access permissions for all employees to ensure least privilege
B. Force a password reset for the impacted employees and revoke any tokens.
C. Configure SSO to prevent passwords from going outside the local network.
D. Set up prevailed access management to ensure auditing is enabled


Answer: B. Force a password reset for the impacted employees and revoke any tokens.

Computer Science & Information Technology

You might also like to view...

____________________ access controls ensure control of the electronic elements of the network.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In the________ step of the software development method, you determine program input, output, and relevant relations.

a. analysis b. specifying c. design d. implementation e. drawing

Computer Science & Information Technology

The INNER JOIN clause returns all rows from at least one of the tables within the FROM clause, as long as those rows meet any WHERE or HAVING search conditions

Indicate whether the statement is true or false

Computer Science & Information Technology

Datasheet view shows the values of the data within the table

Indicate whether the statement is true or false

Computer Science & Information Technology