Ann the security administrator has been reviewing logs and has found several overnight sales personnel are accessing the finance department's network shares. Which of the following security controls should be implemented to BEST remediate this?
A. Mandatory access
B. Separation of duties
C. Time of day restrictions
D. Role based access
Answer: C. Time of day restrictions
Computer Science & Information Technology
You might also like to view...
A page break
A) stops the printer from printing. B) indicates where data starts on a new printed page. C) freezes only the top row. D) is the sequence in which pages print.
Computer Science & Information Technology
________ is the process of evaluating input from a user to determine whether or not it is valid
Fill in the blank(s) with correct word
Computer Science & Information Technology