1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svet_ta [14]
4 years ago
9

A forensic investigation discovered that accounts belonging to employees who were terminated numerous years ago were recently us

ed to gain unauthorized access on a company's web servers. Which of the following controls would reduce the risk of this reoccurring?
А. Enable time-of-day restrictions.
B. Disable inactive accounts on a timely basis.
C. Increase the password complexity requirements.
D. Run regular account usage audits.
E. Set expiration dates for all temporary accounts.
F. Prohibit the use of shared accounts in an AUP.
Computers and Technology
1 answer:
Anni [7]4 years ago
5 0

Answer:

А. Enable time-of-day restrictions.

B. Disable inactive accounts on a timely basis.

E. Set expiration dates for all temporary accounts.

Explanation:

If a forensic investigation reveals that accounts belonging to employees who were terminated numerous years ago were recently used to gain unauthorized access on a company's web servers. The following controls if used by the network administrator would reduce the risk of this reoccurring;

1. Enable time-of-day restrictions: this settings would use the group policy to create an access rule that restricts users or traffics on the server once the time of day to access has elapsed

2. Disable inactive accounts on a timely basis: the network administrator should ensure inactive accounts of former employees are permanently disabled at regular intervals.

3. Set expiration dates for all temporary accounts: accounts that are being used temporarily should have an expiration date, so that they are automatically disabled on the company’s web server.

In conclusion, if all of this protocols or policies are judiciously implemented by the network administrator, it would be almost impossible for hackers to gain access to the company's web server.

You might be interested in
When the degree of color contrast between items is low, the content is easier to see and read. True or False
Alexus [3.1K]

the answer is false

hope that helps

3 0
3 years ago
Suppose that the following elements are added in the specified order to an empty binary search tree: Lisa, Bart, Marge, Homer, M
Alecsey [184]

Answer:

Pre-order: Lisa, Bart, Homer, Flanders, Marge, Maggie, Smithers, Milhouse

In-order: Bart, Flanders, Homer, Lisa, Maggie, Marge, Milhouse, Smithers

Post-order: Flanders, Homer, Bart, Maggie, Milhouse, Smithers, Marge, Lisa

Explanation:

The required orders are mentioned.

4 0
4 years ago
For an activity with more than one immediate predecessor activity, which of the following is used to compute its earliest finish
laila [671]

Answer:

The correct option is A

Explanation:

In project management, earliest finish time for activity A refers to the earliest start time for succeeding activities such as B and C to start.

Assume that activities A and B comes before C, the earliest finish time for C can be arrived at by computing the earliest start-finish (critical path) of the activity with the largest EF.

That is, if two activities (A and B) come before activity C, one can estimate how long it's going to take to complete activity C if ones knows how long activity B will take (being the activity with the largest earliest finish time).

Cheers!

7 0
3 years ago
Which are types of lines? Choose three answers.
alekssr [168]
Straight
Curvilinear
Rectilinear
7 0
3 years ago
When you reference a cell or range in a different worksheet, the ____ separates the sheet reference from the cell reference.
Lera25 [3.4K]
B.   !  

(e<span>xclamation point is the symbol that </span>separates<span> a </span>worksheet reference<span> from a </span><span>cell reference)</span>
6 0
3 years ago
Other questions:
  • Which of the following subject lines would be best to use when applying for a position in a high school teacher
    11·1 answer
  • Use NumPy to recreate your answer to Question 1b. The input parameters will both be python lists, so you will need to convert th
    8·1 answer
  • James, a technician, needs to format a new drive on a workstation. He will need to configure read attributes to specific local f
    5·1 answer
  • My dog peed in the house last week
    6·2 answers
  • How do assignment article computer security, ethics and privacy?
    15·1 answer
  • Brian has created the following selection sort class in Java. In which line is the index of the smallest value returned? In whic
    8·1 answer
  • PLEASE HELP!! WILL MARK BRAINLIEST!!
    15·1 answer
  • What are the four different orchestral instrument families?
    6·2 answers
  • Directions: Give the shortcut key for the following commands: 1. Open 2. Save 3. New document 4. Copy 5. Undo 6. Redo 7. Paste 8
    5·1 answer
  • A(n) ________ will clear all user data and setting changes, returning the device's software to the state it was in when it left
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!