A cyber security administrator receives a list of IPs that have been reported as attempting to access the network. To identify any possible successful attempts across the enterprise, which of the following should be implemented?
A. Monitor authentication logs
B. Disable unnecessary accounts
C. Time of day restrictions
D. Separation of duties
Answer: B. Disable unnecessary accounts
Computer Science & Information Technology
You might also like to view...
_______________ is an IP-based storage networking solution that links data storage to host computers.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Clicking the slide button navigation tool during a presentation displays a shortcut menu
Indicate whether the statement is true or false
Computer Science & Information Technology
To repeat column and row titles on every page you would use which command?
A) Freeze Titles B) Lock Titles C) Freeze Panes D) Print Titles
Computer Science & Information Technology
Because the values in pointers are all addresses, any pointer can be assigned to any other pointer.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology