?You work for a company that is growing. Originally, all the users in all departments had access to all the data in the database. It is considered a security risk. What is an appropriate action to reduce the risk?

A. ?Install a two-step login procedure, where the user has to key in additional information for logging in
B. Install and provide stronger anti-virus software on the users' computers
C. Tweak the firewall parameters so that outgoing traffic can be better controlled
D. Assign roles and privileges to users so that only job-relevant data is accessible to the user.


Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following optical storage media has the greatest storage capacity?

A) DVD DL B) DVD C) BD D) CD

Computer Science & Information Technology

jQuery is a ____ framework.

A. JavaScript B. UNIX C. Perl D. C++

Computer Science & Information Technology

________ can be named, organized, and offer a location in which to store files

Fill in the blank(s) with correct word

Computer Science & Information Technology

What is the shortcut for deselecting?

What will be an ideal response?

Computer Science & Information Technology