1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svet_ta [14]
3 years ago
9

A forensic investigation discovered that accounts belonging to employees who were terminated numerous years ago were recently us

ed to gain unauthorized access on a company's web servers. Which of the following controls would reduce the risk of this reoccurring?
А. Enable time-of-day restrictions.
B. Disable inactive accounts on a timely basis.
C. Increase the password complexity requirements.
D. Run regular account usage audits.
E. Set expiration dates for all temporary accounts.
F. Prohibit the use of shared accounts in an AUP.
Computers and Technology
1 answer:
Anni [7]3 years ago
5 0

Answer:

А. Enable time-of-day restrictions.

B. Disable inactive accounts on a timely basis.

E. Set expiration dates for all temporary accounts.

Explanation:

If a forensic investigation reveals that accounts belonging to employees who were terminated numerous years ago were recently used to gain unauthorized access on a company's web servers. The following controls if used by the network administrator would reduce the risk of this reoccurring;

1. Enable time-of-day restrictions: this settings would use the group policy to create an access rule that restricts users or traffics on the server once the time of day to access has elapsed

2. Disable inactive accounts on a timely basis: the network administrator should ensure inactive accounts of former employees are permanently disabled at regular intervals.

3. Set expiration dates for all temporary accounts: accounts that are being used temporarily should have an expiration date, so that they are automatically disabled on the company’s web server.

In conclusion, if all of this protocols or policies are judiciously implemented by the network administrator, it would be almost impossible for hackers to gain access to the company's web server.

You might be interested in
Which of the following boxes should replace question mark
Rus_ich [418]

Answer:

There is nothing please put it then i will edit this answer.

Explanation:

6 0
3 years ago
To change the size of a field or record by dragging its border a.resize b.magnify c.label d.enlarge
4vir4ik [10]
A. Resize

By dragging the border of a field or record, you are either enlarging it or compressing it. Choices "b" and "d" are only half correct, as there is always the possibility of making it smaller. Hope this helps!
6 0
2 years ago
Read 2 more answers
What happens when you double-click one of the graphic options in the middle panel of the choose a smartart graphic dialog box?
pickupchik [31]
When you open MS Word, selecting the insert option and clicking SmartArt, will pop up SmartArt dialog box. Double-clicking on one of the graphic options in the middle panel will automatically select and place the graphic art you want. It is an easy way of inserting a SmartArt of your choice without selecting the art itself and clicking OK.





3 0
2 years ago
Read 2 more answers
Which of the following is true about sorting functions?
il63 [147K]

Answer: Option D -- Sorting an already sorted array of size n with quicksort takes O(n log n) time.

Explanation:

Sorting an already sorted array of size n with quicksort takes O(n log n) time is true about sorting functions while other options are wrong.

8 0
3 years ago
Laurel, the manager of a software company, assumes that the male employees in his organization are more creative and innovative
grandymaker [24]

Answer:

Sterotyping

Explanation:

A stereotype is an over-generalized perception or view about a particular category of individuals or group. It is a belief that people might have concerning each and every person of a particular group. The type of expectation can differ from people to people; it can be, for instance, a belief or perception about a particular group's personality, preferences, or ability.

5 0
3 years ago
Other questions:
  • Doe's anyone know how to access developer mode on a Chromebook laptop if enterprise enrollment blocks it?
    14·2 answers
  • From the Start screen, you can A. access recently opened Excel workbooks. B. create a document from a template. C. create new bl
    12·2 answers
  • What is the output of the following code? public class Test { public static void main(String[] args) { String s1 = new String("J
    9·1 answer
  • What are the features of a strong résumé? Check all that apply.
    7·1 answer
  • What disese is sue suffering from
    15·2 answers
  • C++
    11·2 answers
  • CHALLENGE ACTIVITY 3.7.2: Type casting: Reading and adding values.
    10·1 answer
  • Why is manual coding the best way to learn HTML?
    11·1 answer
  • Kris is the project manager for a large software company. Which part of project management describes the overall project in deta
    11·2 answers
  • What is it called when servers on the Internet supply applications as a service, rather than a product
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!