Joe notices there are several user accounts on the local network generating spam with embedded malicious code. Which of the following technical control should Joe put in place to BEST reduce these incidents?

A. Account lockout
B. Group Based Privileges
C. Least privilege
D. Password complexity

Answer: A. Account lockout

Computer Science & Information Technology

You might also like to view...

The keyboard shortcut that will move the insertion point to the blank line at the end of a document is ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Discuss why detailed definition of the organizational boundaries of protected space is an essential step in the proper management of the system which will eventually be implemented.

What will be an ideal response?

Computer Science & Information Technology