A one time security audit revealed that employees do not have the appropriate access to system resources. The auditor is concerned with the fact that most of the accounts audited have unneeded elevated permission to sensitive resources. Which of the following was implemented to detect this issue?
A. Continuous monitoring
B. Account review
C. Group based privileges
D. Credential management
Answer: B. Account review
You might also like to view...
Case-Based Critical Thinking QuestionsCase 2-2Max recently came back from Australia, where he developed a Web site about Australian animals. He used the following image to create the code for an image map, shown below the picture. When he tested the code in a browser, he discovered that the code does not work properly. He asked his brother Ethan to help him fix the code. Ethan asked him several questions in order to help him. (Note: The image size is 420 x 280 pixels.)
A ____ relational expression consists of a relational operator connecting two variable and/or constant operands.
A. standard B. default C. single D. simple
On forms that contain sensitive information, ____________________, such as HTTPS or SSL, are used to encrypt the data before it is transferred over the Internet.
Fill in the blank(s) with the appropriate word(s).
A portable data storage device has been determined to have malicious firmware.Which of the following is the BEST course of action to ensure data confidentiality?
A. Format the device B. Re-image the device C. Perform virus scan in the device D. Physically destroy the device