How can an organization protect itself from compromise by accounts that were used by previous employees?
A. Account provisioning
B. Account deactivation
C. Account lockout
D. Account audit
Answer: B. Account deactivation
Computer Science & Information Technology
You might also like to view...
The default setting for the Required field property for most fields is ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
While viewing slides in the Slide Sorter, a(n) ________ icon indicates that a slide has animation
A) arrow B) red circle C) check mark D) star
Computer Science & Information Technology