A one time security audit revealed that employees do not have the appropriate access to system resources. The auditor is concerned with the fact that most of the accounts audited have unneeded elevated permission to sensitive resources. Which of the following was implemented to detect this issue?

A. Continuous monitoring
B. Account review
C. Group based privileges
D. Credential management


Answer: B. Account review

Computer Science & Information Technology

You might also like to view...

Case-Based Critical Thinking QuestionsCase 2-2Max recently came back from Australia, where he developed a Web site about Australian animals. He used the following image to create the code for an image map, shown below the picture. When he tested the code in a browser, he discovered that the code does not work properly. He asked his brother Ethan to help him fix the code. Ethan asked him several questions in order to help him. (Note: The image size is 420 x 280 pixels.)

Australian Parrots

shape="rect" coords="100, 20, 440, 160" href="penguins.htm" alt="Australian Penguins" title="Australian Penguins" />Australian KangaroosAustralian Koalas

Ethan discovered that the values for one of the four coords attributes is incorrect, so the areas of the image are overlapped. Which one needs to be corrected? A. 20, 20, 230, 160 B. 100, 20, 440, 160 C. 20, 160, 230, 300 D. 230, 160, 440, 300

Computer Science & Information Technology

A ____ relational expression consists of a relational operator connecting two variable and/or constant operands.

A. standard B. default C. single D. simple

Computer Science & Information Technology

On forms that contain sensitive information, ____________________, such as HTTPS or SSL, are used to encrypt the data before it is transferred over the Internet.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A portable data storage device has been determined to have malicious firmware.Which of the following is the BEST course of action to ensure data confidentiality?

A. Format the device B. Re-image the device C. Perform virus scan in the device D. Physically destroy the device

Computer Science & Information Technology