Pete, a system administrator, has concerns regarding his users accessing systems and secured areas using others' credentials. Which of the following can BEST address this concern?

A. Create conduct policies prohibiting sharing credentials.
B. Enforce a policy shortening the credential expiration timeframe.
C. Implement biometric readers on laptops and restricted areas.
D. Install security cameras in areas containing sensitive systems.


Ans: C. Implement biometric readers on laptops and restricted areas.

Computer Science & Information Technology

You might also like to view...

Based on the results of the Solver Sensitivity Report, which resource, if increased, would have the biggest impact on profit? How do you know this?

What will be an ideal response?

Computer Science & Information Technology

The ________ add-in uncovers a variety of problems including formula errors or inconsistencies, hidden information, and broken links

A) Analyze B) PowerPivot C) Power View D) Inquire

Computer Science & Information Technology

A(n) ________ is a series of actions that can be programmed to automate tasks.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

If you want to email a term paper and need to keep its formatting, you would send it as an ____

A. URL B. Instant message C. text message D. attachment

Computer Science & Information Technology