Pete, a system administrator, has concerns regarding his users accessing systems and secured areas using others' credentials. Which of the following can BEST address this concern?
A. Create conduct policies prohibiting sharing credentials.
B. Enforce a policy shortening the credential expiration timeframe.
C. Implement biometric readers on laptops and restricted areas.
D. Install security cameras in areas containing sensitive systems.
Ans: C. Implement biometric readers on laptops and restricted areas.
You might also like to view...
Based on the results of the Solver Sensitivity Report, which resource, if increased, would have the biggest impact on profit? How do you know this?
What will be an ideal response?
The ________ add-in uncovers a variety of problems including formula errors or inconsistencies, hidden information, and broken links
A) Analyze B) PowerPivot C) Power View D) Inquire
A(n) ________ is a series of actions that can be programmed to automate tasks.
Fill in the blank(s) with the appropriate word(s).
If you want to email a term paper and need to keep its formatting, you would send it as an ____
A. URL B. Instant message C. text message D. attachment