A security analyst had received information from a third-party intelligence-sharing resource that indicates employee accounts were breached. Which of the following is the NEXT step the analyst should take to address the issue?

A. Audit access permissions for all employees to ensure least privilege
B. Force a password reset for the impacted employees and revoke any tokens.
C. Configure SSO to prevent passwords from going outside the local network.
D. Set up prevailed access management to ensure auditing is enabled

Answer: B. Force a password reset for the impacted employees and revoke any tokens.

Computer Science & Information Technology

You might also like to view...

If you only need to change a few records, you can use the ________ instead of running an update query

Fill in the blank(s) with correct word

Computer Science & Information Technology

The iPhone Device Firmware Upgrade (DFU) Mode enables the user to select the firmware version to install on the device

Indicate whether the statement is true or false.

Computer Science & Information Technology