How can an organization protect itself from compromise by accounts that were used by previous employees?

A. Account provisioning
B. Account deactivation
C. Account lockout
D. Account audit


Answer: B. Account deactivation

Computer Science & Information Technology

You might also like to view...

A FormatException generally indicates that ________.

a) the user attempted division by zero b) a method was passed an argument of the wrong type c) a method was passed the wrong number of arguments d) the program contains a syntax error e) None of the above.

Computer Science & Information Technology

Users find it easier to scan content when page elements are aligned vertically and horizontally.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Match the following terms to their meanings:

I. formulas II. semi-selection III. starts all formulas IV. A2+A3 V. =C24*D24 A. pointing to cells when building a formula B. change static numbers into meaningful results C. text D. formula E. equal sign (=)

Computer Science & Information Technology

A user reports that a workstation fails to complete boot up and repeats a series of two beeps over and over. The user states that the workstation had been displaying BSOD errors after running multiple applications. Which of the following is the MOST likely cause?

A. Video adapter failure B. Memory failure C. Power supply failure D. CPU failure

Computer Science & Information Technology