A one time security audit revealed that employees do not have the appropriate access to system resources. The auditor is concerned with the fact that most of the accounts audited have unneeded elevated permission to sensitive resources. Which of the following was implemented to detect this issue?

A. Continuous monitoring
B. Account review
C. Group based privileges
D. Credential management

Answer: B. Account review

Computer Science & Information Technology

You might also like to view...

Slides that are NOT adjacent to each other in a presentation are ________ slides

Fill in the blank(s) with correct word

Computer Science & Information Technology

What is the difference between push and slice?

What will be an ideal response?

Computer Science & Information Technology