Ryan received a security audit that included a finding that the organization lacked sufficient administrative controls in their security program. What action could he take to address this finding?

What will be an ideal response?


Enhance an existing policy.

Computer Science & Information Technology

You might also like to view...

In parallel arrays, corresponding elements in each array must have the same __________.

Fill in the blank(s) with correct word

Computer Science & Information Technology

An administrator is assigning Windows user accounts to user groups based on the user’s role and notices the built-in Power Users group.   What is the purpose of the Power Users group in Windows 7 and later?

A. Allows members to take ownership of files and folders. B. Members have limited privileges and are given a temporary profile. C. Provides a method for assigning rights to Guests who require Administrator access. D. Backward compatibility for legacy operating systems and applications.

Computer Science & Information Technology

Describe the different types of personal computers and provide relevant examples of each.

What will be an ideal response?

Computer Science & Information Technology

Committing crimes with e-mail is uncommon, and investigators are not generally tasked with linking suspects to e-mail.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology