A system requires administrators to be logged in as the "root" in order to make administrator changes. Which of the following controls BEST mitigates the risk associated with this scenario?

A. Require that all administrators keep a log book of times and justification for accessing root
B. Encrypt all users home directories using file-level encryption
C. Implement a more restrictive password rotation policy for the shared root account
D. Force administrator to log in with individual accounts and switch to root
E. Add the administrator to the local group

Answer: D. Force administrator to log in with individual accounts and switch to root

Computer Science & Information Technology

You might also like to view...

sum(n) =1+2+3+...+n, where n>1 is an example of a(n) ____ algorithm.

A. recursive B. iterative C. complex D. infinite

Computer Science & Information Technology

With most programs, compiling or interpreting a program for the first time will result in errors, and the assembling process consists of locating and correcting these errors.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology