Joe notices there are several user accounts on the local network generating spam with embedded malicious code. Which of the following technical control should Joe put in place to BEST reduce these incidents?
A. Account lockout
B. Group Based Privileges
C. Least privilege
D. Password complexity
Answer: A. Account lockout
Computer Science & Information Technology
You might also like to view...
The keyboard shortcut that will move the insertion point to the blank line at the end of a document is ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
Discuss why detailed definition of the organizational boundaries of protected space is an essential step in the proper management of the system which will eventually be implemented.
What will be an ideal response?
Computer Science & Information Technology