The internal audit group discovered that unauthorized users are making unapproved changes to various system configuration settings. This issue occurs when previously authorized users transfer from one department to another and maintain the same credentials. Which of the following controls can be implemented to prevent such unauthorized changes in the future?

A. Periodic access review
B. Group based privileges
C. Least privilege
D. Account lockout


Answer: C. Least privilege

Computer Science & Information Technology

You might also like to view...

A(n) _______ __________ array named FullName is declared as FullName[x, y].

Fill in the blank(s) with correct word

Computer Science & Information Technology

To ensure a digital image will be displayed in the relative dimensions that you want (say, one-fourth of the screen width) on a Web page, you need to find out _____.

A. the monitor resolution of the target audience to calculate the image's pixel dimensions B. dpi of the target audience's monitor to calculate the image's pixel dimensions C. the monitor resolution of the target audience to calculate the image's physical dimensions D. dpi of the target audience's monitor to calculate the image's physical dimensions

Computer Science & Information Technology

Hybrid processors that can process 32 bits or 64 bits are known by what term?

A. x86 processors B. Itanium processors C. Dual Mode processors D. x86-64 processors

Computer Science & Information Technology

After a video card upgrade nothing is displayed on the LCD screen. Which of the following is the MOST likely cause of the problem?

A. The new video card has to be first installed using the Services MMC. B. The onboard video of the motherboard is still enabled in the BIOS. C. New video cards require new monitors as their resolutions do not match D. The new video card has to be enabled by a DIP switch on the motherboard.

Computer Science & Information Technology