Which of the following is the BEST approach to perform risk mitigation of user access control rights?
A. Conduct surveys and rank the results.
B. Perform routine user permission reviews.
C. Implement periodic vulnerability scanning.
D. Disable user accounts that have not been used within the last two weeks.
Answer: B. Perform routine user permission reviews.
You might also like to view...
Java provides a looping mechanism for objects of a collection. This looping mechanism is called a __________ loop.
a. While b. For c. For each d. All of the above
What tools are available for code generation on LINUX and UNIX? What is the purpose of each tool?
What will be an ideal response?
A CSS ____ enables you to change the value of CSS properties gradually over a specified period of time.
A. transition B. baseline C. index D. matrix
The ____ is the maximum number of horizontal and vertical pixels that can be displayed on a screen.
A. screen size B. bit depth C. resolution D. color depth