Which of the following is the BEST approach to perform risk mitigation of user access control rights?

A. Conduct surveys and rank the results.
B. Perform routine user permission reviews.
C. Implement periodic vulnerability scanning.
D. Disable user accounts that have not been used within the last two weeks.


Answer: B. Perform routine user permission reviews.

Computer Science & Information Technology

You might also like to view...

Java provides a looping mechanism for objects of a collection. This looping mechanism is called a __________ loop.

a. While b. For c. For each d. All of the above

Computer Science & Information Technology

What tools are available for code generation on LINUX and UNIX? What is the purpose of each tool?

What will be an ideal response?

Computer Science & Information Technology

A CSS ____ enables you to change the value of CSS properties gradually over a specified period of time.

A. transition B. baseline C. index D. matrix

Computer Science & Information Technology

The ____ is the maximum number of horizontal and vertical pixels that can be displayed on a screen.

A. screen size B. bit depth C. resolution D. color depth

Computer Science & Information Technology