Human Resources suspects an employee is accessing the employee salary database. The administrator is asked to find out who it is. In order to complete this task, which of the following is a security control that should be in place?

A. Shared accounts should be prohibited.
B. Account lockout should be enabled
C. Privileges should be assigned to groups rather than individuals
D. Time of day restrictions should be in use


Answer: A. Shared accounts should be prohibited.

Computer Science & Information Technology

You might also like to view...

Click inside a field to ____ data.

A. enter B. edit C. either a. or b. D. neither a. nor b.

Computer Science & Information Technology

Which of the following statements is true for a doubly linked list?

a. It has at least two pointers in each node. b. It has a backup of the data. c. It stores the elements in a sorted manner. d. It has twice the number of nodes as a normal linked list.

Computer Science & Information Technology

Choose the item below that is not an HTML5 element

a. footer b. figcaption c. wrapper d. article

Computer Science & Information Technology

Code editors can improve the readability of HTML code by applying appropriate indenting and line spacing automatically.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology