During a routine audit it is discovered that someone has been using a state administrator account to log into a seldom used server. The person used server. The person has been using the server to view inappropriate websites that are prohibited to end users. Which of the following could BEST prevent this from occurring again?

A. Credential management
B. Group policy management
C. Acceptable use policies
D. Account expiration policies


Answer: D. Account expiration policies

Computer Science & Information Technology

You might also like to view...

Access has a specialized ________ that can be used for mailing labels, name tags, or other types of labels

A) table B) report C) query D) form

Computer Science & Information Technology

________ typically broadcast live events and use streaming technology in which audio and video files are continuously downloaded to your computer while you are listening to and/or viewing the content.

A. Twitter B. Blogs C. Microblogs D. Webcasts

Computer Science & Information Technology

In a graph, a node is called a ____.

A. vertex B. segment C. line D. element

Computer Science & Information Technology

A(n) ____________________  is a visual display of key performance measures in a help desk software package used to monitor a help desk operation and identify issues that need management attention.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology