Which of the following is the BEST approach to perform risk mitigation of user access control rights?
A. Conduct surveys and rank the results.
B. Perform routine user permission reviews.
C. Implement periodic vulnerability scanning.
D. Disable user accounts that have not been used within the last two weeks.
Answer: B. Perform routine user permission reviews.
Computer Science & Information Technology
You might also like to view...
A ________ is a window within a Microsoft Office application that allows the user to enter options for completing a command
A) details pane B) navigation pane C) folder window D) task pane
Computer Science & Information Technology
Which of the following is based off of the MD5 hash?
A. LANMAN B. NTLM C. NTLM2 D. SHA-1
Computer Science & Information Technology