A cyber security administrator receives a list of IPs that have been reported as attempting to access the network. To identify any possible successful attempts across the enterprise, which of the following should be implemented?
A. Monitor authentication logs
B. Disable unnecessary accounts
C. Time of day restrictions
D. Separation of duties
Answer: B. Disable unnecessary accounts
Computer Science & Information Technology
You might also like to view...
Word has ________, which are partially completed documents such as letters, memos, reports, and resumes that contain preformatted text and/or graphics
A) styles B) templates C) layouts D) themes
Computer Science & Information Technology
RAID 1 is known as striping with parity
Indicate whether the statement is true or false
Computer Science & Information Technology