Ann the security administrator has been reviewing logs and has found several overnight sales personnel are accessing the finance department's network shares. Which of the following security controls should be implemented to BEST remediate this?
A. Mandatory access
B. Separation of duties
C. Time of day restrictions
D. Role based access
Answer: C. Time of day restrictions
You might also like to view...
Which component of an acceptable use agreement defines (and includes examples of) the classification schema adopted by the organization?
A) Introduction B) Data classifications C) Applicable policy statements D) Handling standards
FIGURE AC 2-1 Figure AC 2-1 above, you would access this Field Properties screen in ____ view.
A. Datasheet B. Design C. Edit D. Table
When we add a node on the left branch of a ____ node, the node is automatically balanced.
A. left high B. right high C. even high D. balanced
Once you rasterize type, other than using the Undo command or reverting the file, you can never go back and convert the rasterized text back into live type.
Answer the following statement true (T) or false (F)