A cyber security administrator receives a list of IPs that have been reported as attempting to access the network. To identify any possible successful attempts across the enterprise, which of the following should be implemented?

A. Monitor authentication logs
B. Disable unnecessary accounts
C. Time of day restrictions
D. Separation of duties


Answer: B. Disable unnecessary accounts

Computer Science & Information Technology

You might also like to view...

_______________ is an IP-based storage networking solution that links data storage to host computers.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Clicking the slide button navigation tool during a presentation displays a shortcut menu

Indicate whether the statement is true or false

Computer Science & Information Technology

To repeat column and row titles on every page you would use which command?

A) Freeze Titles B) Lock Titles C) Freeze Panes D) Print Titles

Computer Science & Information Technology

Because the values in pointers are all addresses, any pointer can be assigned to any other pointer.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology