A cyber security administrator receives a list of IPs that have been reported as attempting to access the network. To identify any possible successful attempts across the enterprise, which of the following should be implemented?

A. Monitor authentication logs
B. Disable unnecessary accounts
C. Time of day restrictions
D. Separation of duties

Answer: B. Disable unnecessary accounts

Computer Science & Information Technology

You might also like to view...

Word has ________, which are partially completed documents such as letters, memos, reports, and resumes that contain preformatted text and/or graphics

A) styles B) templates C) layouts D) themes

Computer Science & Information Technology

RAID 1 is known as striping with parity

Indicate whether the statement is true or false

Computer Science & Information Technology