Joe notices there are several user accounts on the local network generating spam with embedded malicious code. Which of the following technical control should Joe put in place to BEST reduce these incidents?

A. Account lockout
B. Group Based Privileges
C. Least privilege
D. Password complexity


Answer: A. Account lockout

Computer Science & Information Technology

You might also like to view...

Which of the following pairs represents a medium frequency band and its common use?

A. 300 KHz-3MHz, AM radio B. 144-174 MHz, TV channels C. 30-300 KHz, cordless phones D. 3-30 MHz, CB and shortwave radio

Computer Science & Information Technology

When using the Label Wizard the selected field names in the Prototype Label text box are surrounded by:

A) single quotes. B) braces. C) square brackets. D) double quotes.

Computer Science & Information Technology

A(n) ________ is a small Web browser windows that displays on top of the website you are viewing

Fill in the blank(s) with correct word

Computer Science & Information Technology

When creating a one-variable data table with substitution values in a horizontal row, the formula reference must be on the row below and one column to the left of the first substitution value

Indicate whether the statement is true or false

Computer Science & Information Technology