1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svet_ta [14]
3 years ago
9

A forensic investigation discovered that accounts belonging to employees who were terminated numerous years ago were recently us

ed to gain unauthorized access on a company's web servers. Which of the following controls would reduce the risk of this reoccurring?
А. Enable time-of-day restrictions.
B. Disable inactive accounts on a timely basis.
C. Increase the password complexity requirements.
D. Run regular account usage audits.
E. Set expiration dates for all temporary accounts.
F. Prohibit the use of shared accounts in an AUP.
Computers and Technology
1 answer:
Anni [7]3 years ago
5 0

Answer:

А. Enable time-of-day restrictions.

B. Disable inactive accounts on a timely basis.

E. Set expiration dates for all temporary accounts.

Explanation:

If a forensic investigation reveals that accounts belonging to employees who were terminated numerous years ago were recently used to gain unauthorized access on a company's web servers. The following controls if used by the network administrator would reduce the risk of this reoccurring;

1. Enable time-of-day restrictions: this settings would use the group policy to create an access rule that restricts users or traffics on the server once the time of day to access has elapsed

2. Disable inactive accounts on a timely basis: the network administrator should ensure inactive accounts of former employees are permanently disabled at regular intervals.

3. Set expiration dates for all temporary accounts: accounts that are being used temporarily should have an expiration date, so that they are automatically disabled on the company’s web server.

In conclusion, if all of this protocols or policies are judiciously implemented by the network administrator, it would be almost impossible for hackers to gain access to the company's web server.

You might be interested in
Examples of domain names and usernames<br><br><br><br>​
svp [43]

Answer:

examples are:

com or .edu is a top-level domain name (TLD)

cornell.edu is a second-level domain name (SLD)

bigred.cornell.edu is a third-level or three-part domain name

project.bigred.cornell.edu is a fourth-level or four-part domain name

hope this helps you.

4 0
3 years ago
What was the importance of the turing machine to today’s computers?
Ronch [10]
It helps you with life and brainly
5 0
3 years ago
What are the advantages and disadvantages of using wireless communications? What are the advantages and disadvantages of using w
Nimfa-mama [501]

Answer:

<u>Advantages of wireless communication:-</u>

  • Flexibility in transferring the message through communication for which the sender and receiver can be in any place.
  • Speed of the communication is accurate and fast
  • Due to no wiring , the cost of the wireless communication is less.

<u>Disadvantages of wireless communication:-</u>

  • The security is less as the data can be accessed by unauthorized sources at times.
  • The setting up of wireless communication complex and expensive.

<u>Advantages of wired communication:-</u>

  • Simple configuration
  • Higher bandwidth is present in the cable
  • High reliability

<u>Disadvantages of wired communication:-</u>

  • Mobility is present for communication
  • Installation requires lot of time due to cabling
  • Requires extra devices for covering large areas for communication

Wireless communication is more preferable than wired communication in the conditions like communication connection that should face low damage and longer life which is not present in cable connection as they break or get disrupted.The flexibility of moving while communication is required by most people so, they use wireless communication .

8 0
3 years ago
List the correct order of steps necessary to using usmt to migrate files from an old computer to a new computer.
dlinn [17]
The USMT (User State Migration Tool) is designed to assist IT professional migrate files to the windows OS. An example is a step by step migration of files and settings from a windows XP environment to windows 8 using USMT. At the end of the day, you will have used LoadState a ScanState to complete this end to end migration. The correct order is as follows; <span><span>


1.      </span>Gather Data Using the ScanState Tool</span>

<span>a)      </span>Install USMT

<span>b)      </span>Run ScanState to Create a Migration Store on the Server

<span>2.       </span>Install Windows

<span>a)      </span>Install Applications

<span>3.       </span>Apply Data Using the LoadState Tool

<span>a)      </span>Install the USMT

<span>b)     </span> Run LoadState






8 0
3 years ago
When I use
slega [8]

Answer:

If it works then no, if it doesn't then yes

Explanation:

Code Academy probably runs either way because it is not taking this as a intense class.

5 0
3 years ago
Other questions:
  • Which of the following is an encryption tool that allows users to encrypt files and folders by simply right-clicking a given obj
    10·2 answers
  • . Stress can affect not only your health, but also other aspectsof your
    15·1 answer
  • When we focus on stereotypes we may ___________________. a. experience culture shock b. develop ethnocentrism c. unconciously lo
    8·2 answers
  • Go online and research the computer topic
    6·1 answer
  • Check my work a(n) ________ reference is an automatically created variable that holds the address of an object and passes it to
    15·1 answer
  • Write an algorithm that receives a number from the user (you can store the number in a variable called N). Then the algorithm sh
    8·1 answer
  • After you configure backup settings using the backup plugin, backup jobs will run automatically and start taking backups at the
    13·1 answer
  • Applications of kinematics in computer engineering​
    7·1 answer
  • Sam’s password is known to be formed of 3 decimal digits (0-9) in a given order. Karren and Larry are attempting to determine Sa
    9·2 answers
  • Can you explain the difference between software and hardware? Tell me 3 examples of each one.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!