?You work for a company that is growing. Originally, all the users in all departments had access to all the data in the database. It is considered a security risk. What is an appropriate action to reduce the risk?
A. ?Install a two-step login procedure, where the user has to key in additional information for logging in
B. Install and provide stronger anti-virus software on the users' computers
C. Tweak the firewall parameters so that outgoing traffic can be better controlled
D. Assign roles and privileges to users so that only job-relevant data is accessible to the user.
Answer: D
Computer Science & Information Technology
You might also like to view...
Which of the following optical storage media has the greatest storage capacity?
A) DVD DL B) DVD C) BD D) CD
Computer Science & Information Technology
jQuery is a ____ framework.
A. JavaScript B. UNIX C. Perl D. C++
Computer Science & Information Technology
________ can be named, organized, and offer a location in which to store files
Fill in the blank(s) with correct word
Computer Science & Information Technology
What is the shortcut for deselecting?
What will be an ideal response?
Computer Science & Information Technology