1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svet_ta [14]
4 years ago
9

A forensic investigation discovered that accounts belonging to employees who were terminated numerous years ago were recently us

ed to gain unauthorized access on a company's web servers. Which of the following controls would reduce the risk of this reoccurring?
А. Enable time-of-day restrictions.
B. Disable inactive accounts on a timely basis.
C. Increase the password complexity requirements.
D. Run regular account usage audits.
E. Set expiration dates for all temporary accounts.
F. Prohibit the use of shared accounts in an AUP.
Computers and Technology
1 answer:
Anni [7]4 years ago
5 0

Answer:

А. Enable time-of-day restrictions.

B. Disable inactive accounts on a timely basis.

E. Set expiration dates for all temporary accounts.

Explanation:

If a forensic investigation reveals that accounts belonging to employees who were terminated numerous years ago were recently used to gain unauthorized access on a company's web servers. The following controls if used by the network administrator would reduce the risk of this reoccurring;

1. Enable time-of-day restrictions: this settings would use the group policy to create an access rule that restricts users or traffics on the server once the time of day to access has elapsed

2. Disable inactive accounts on a timely basis: the network administrator should ensure inactive accounts of former employees are permanently disabled at regular intervals.

3. Set expiration dates for all temporary accounts: accounts that are being used temporarily should have an expiration date, so that they are automatically disabled on the company’s web server.

In conclusion, if all of this protocols or policies are judiciously implemented by the network administrator, it would be almost impossible for hackers to gain access to the company's web server.

You might be interested in
Which studio produced the film the jazz singer the first of many talkies
sasho [114]
What is a talkie ? please tell me
7 0
3 years ago
Please answer my question i dont know what suitable techinal term is​
kompoz [17]

Answer:

e-mail is the ans email is the ans

8 0
3 years ago
Which device stores data only temporarily, and only when the computer is running?
Artist 52 [7]
1. C) RAM

2. C) CPU

3. B) Accounts Payable

I believe these are the correct answers you are looking for.

8 0
4 years ago
If you are planning to carry a large balance on your credit card, which of the following credit card features should you look fo
fredd [130]
You should use an American Express.
5 0
3 years ago
When an event occurs, the agent logs details regarding the event. what is this event called?
Nimfa-mama [501]

If an event occurs, the agent logs details regarding the event. what is this event called GET.

The information in the agent log file is known to be the beginning of the log file, which is stated to show the agent's launch and handling of the services and configuration settings.

Keep in mind that the agent log also contains a history of the activities performed by the agent during runtime, along with any errors, and that it is utilised to investigate deployment issues.

As a result, if an event happens, the agent logs information about it. What is this GET event, exactly?

The agent monitoring services' startup and configuration settings are displayed at the log file's beginning. The sequence of agent runtime activity and any observed exceptions are also included in the agent log.

Learn more about agent logs:

brainly.com/question/28557574

#SPJ4

8 0
1 year ago
Other questions:
  • What systemctl command configures a unit to start the next time the computer boots?
    10·1 answer
  • Write, compile and test (show your test runs!) program that calculates and returns the fourth root of the number 81, which is 3.
    11·1 answer
  • Using a for loop, print the decimal equivalents of ½, 1/3, ¼, … 1/10. Also, using a while loop, print the decimal equivalents of
    6·1 answer
  • What is the purpose of primary manufacturing processes?
    12·2 answers
  • What happens if the user sysadmin invokes the mail command interface and there are no unread mail messages?
    13·1 answer
  • after clicking the start button on your computer screen desktop what option would you then select to examine system components y
    15·1 answer
  • Jasmine is writing a shopping app. She has created a variable to keep track of the number of items in the shopping cart. Every t
    6·1 answer
  • When would you use the AutoFit to Contents option?
    15·1 answer
  • Which testing is an example of non-functional testing? A. testing a module B. testing integration of three modules C. testing a
    13·1 answer
  • Why might you use the More button in the Find and Replace dialog box?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!