When Ann an employee returns to work and logs into her workstation she notices that, several desktop configuration settings have changed. Upon a review of the CCTV logs, it is determined that someone logged into Ann's workstation. Which of the following could have prevented this from happening?
A. Password complexity policy
B. User access reviews
C. Shared account prohibition policy
D. User assigned permissions policy
Ans: A. Password complexity policy
You might also like to view...
Training developed using ____ is more likely to produce optimally skilled and knowledgeable personnel.
A. continuous reviews B. continuous monitoring C. continuous evaluation D. continuous awareness
One of the techniques to help manage your creations is:
A. Use style comments throughout, especially at the bottom of the file. B. Divide your style sheet into sections, with comments marking the page headings. C. Keep your style sheets as small as possible, and break them into separate files if necessary. D. Choose several organizing schemes.
Which of the following best describes the purpose of the detection and investigation portion of the incident response plan?
A. To describe the steps that need to be taken to prevent the incident from spreading B. To establish processes and knowledge base to accurately detect and assess precursors and indicators C. To describe incident declaration and notification D. To describe the steps to eliminate the components of the incident
?
In the figure above, item ____ shows style rule(s) applied to multiple selectors.
A. 1 B. 2 C. 3 D. 4