When Ann an employee returns to work and logs into her workstation she notices that, several desktop configuration settings have changed. Upon a review of the CCTV logs, it is determined that someone logged into Ann's workstation. Which of the following could have prevented this from happening?

A. Password complexity policy
B. User access reviews
C. Shared account prohibition policy
D. User assigned permissions policy


Ans: A. Password complexity policy

Computer Science & Information Technology

You might also like to view...

Training developed using ____ is more likely to produce optimally skilled and knowledgeable personnel.

A. continuous reviews B. continuous monitoring C. continuous evaluation D. continuous awareness

Computer Science & Information Technology

One of the techniques to help manage your creations is:

A. Use style comments throughout, especially at the bottom of the file. B. Divide your style sheet into sections, with comments marking the page headings. C. Keep your style sheets as small as possible, and break them into separate files if necessary. D. Choose several organizing schemes.

Computer Science & Information Technology

Which of the following best describes the purpose of the detection and investigation portion of the incident response plan?

A. To describe the steps that need to be taken to prevent the incident from spreading B. To establish processes and knowledge base to accurately detect and assess precursors and indicators C. To describe incident declaration and notification D. To describe the steps to eliminate the components of the incident

Computer Science & Information Technology

? In the figure above, item ____ shows style rule(s) applied to multiple selectors.

A. 1 B. 2 C. 3 D. 4

Computer Science & Information Technology