A recent security audit discovered several apparently dormant user accounts. Although users could log on to the accounts, no one had logged on to them for more than 60 days. You later discovered that these accounts are for contractors who work approximately for one week every quarter. Which of the following is the BEST response to this situation?

A. Remove the account expiration from the accounts

B. Delete the account

C. Reset the Accounts

D. Disable the accounts


D. Disable the accounts

Computer Science & Information Technology

You might also like to view...

Providing your mother’s maiden name as verification is an example of which of the following?

A) Multilayer authentication B) One-time passcode C) Multifactor authentication D) Cognitive password

Computer Science & Information Technology

The size or ______of most outp ut devices is typically expressed in terms of pixels.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Write a function that lists the number of ordinary files, directories, block special files, character special files, FIFOs, and symbolic links in the working directory. Do this in two different ways:

a. Use the first letter of the output of ls –l to determine a file’s type. b. Use the file type condition tests of the [[ expression ]] syntax to determine a file’s type.

Computer Science & Information Technology

A wireless security toolkit should include the ability to sniff wireless traffic, scan wireless hosts, and assess the level of privacy or confidentiality afforded on the wireless network. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology