How can an organization protect itself from compromise by accounts that were used by previous employees?

A. Account provisioning
B. Account deactivation
C. Account lockout
D. Account audit

Answer: B. Account deactivation

Computer Science & Information Technology

You might also like to view...

The default setting for the Required field property for most fields is ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

While viewing slides in the Slide Sorter, a(n) ________ icon indicates that a slide has animation

A) arrow B) red circle C) check mark D) star

Computer Science & Information Technology