Jo an employee reports to the security manager that several files in a research and development folder that only JOE has access to have been improperly modified. The modified data on the files in recent and the modified by account is Joe's. The permissions on the folder have not been changed, and there is no evidence of malware on the server hosting the folder or on Joe's workstation. Several failed login attempts to Joe's account were discovered in the security log of the LDAP server. Given this scenario, which of the following should the security manager implement to prevent this in the future?
A. Generic account prohibition
B. Account lockout
C. Password complexity
D. User access reviews
Answer: B. Account lockout
You might also like to view...
Class Array’s ________ method is used to create a Stream from an array of objects.
a. stream b. arrayToStream c. createStream d. objectToStream
In a video file, each ____________________ represents a single image.
Fill in the blank(s) with the appropriate word(s).
A company has a BYOD policy that includes tablets and smart phones. In the case of a legal investigation, which of the following poses the greatest security issues?
A. Recovering sensitive documents from a device if the owner is unable or unwilling to cooperate B. Making a copy of all of the files on the device and hashing them after the owner has provided the PIN C. Using GPS services to locate the device owner suspected in the investigation D. Wiping the device from a remote location should it be identified as a risk in the investigation
A(n) __________-controlled loop repeats a statement or set of statements a specific number of times.
Fill in the blank(s) with the appropriate word(s).