Ann the security administrator has been reviewing logs and has found several overnight sales personnel are accessing the finance department's network shares. Which of the following security controls should be implemented to BEST remediate this?

A. Mandatory access
B. Separation of duties
C. Time of day restrictions
D. Role based access

Answer: C. Time of day restrictions

Computer Science & Information Technology

You might also like to view...

A page break

A) stops the printer from printing. B) indicates where data starts on a new printed page. C) freezes only the top row. D) is the sequence in which pages print.

Computer Science & Information Technology

________ is the process of evaluating input from a user to determine whether or not it is valid

Fill in the blank(s) with correct word

Computer Science & Information Technology