1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svet_ta [14]
3 years ago
9

A forensic investigation discovered that accounts belonging to employees who were terminated numerous years ago were recently us

ed to gain unauthorized access on a company's web servers. Which of the following controls would reduce the risk of this reoccurring?
А. Enable time-of-day restrictions.
B. Disable inactive accounts on a timely basis.
C. Increase the password complexity requirements.
D. Run regular account usage audits.
E. Set expiration dates for all temporary accounts.
F. Prohibit the use of shared accounts in an AUP.
Computers and Technology
1 answer:
Anni [7]3 years ago
5 0

Answer:

А. Enable time-of-day restrictions.

B. Disable inactive accounts on a timely basis.

E. Set expiration dates for all temporary accounts.

Explanation:

If a forensic investigation reveals that accounts belonging to employees who were terminated numerous years ago were recently used to gain unauthorized access on a company's web servers. The following controls if used by the network administrator would reduce the risk of this reoccurring;

1. Enable time-of-day restrictions: this settings would use the group policy to create an access rule that restricts users or traffics on the server once the time of day to access has elapsed

2. Disable inactive accounts on a timely basis: the network administrator should ensure inactive accounts of former employees are permanently disabled at regular intervals.

3. Set expiration dates for all temporary accounts: accounts that are being used temporarily should have an expiration date, so that they are automatically disabled on the company’s web server.

In conclusion, if all of this protocols or policies are judiciously implemented by the network administrator, it would be almost impossible for hackers to gain access to the company's web server.

You might be interested in
David needs to create a password. He uses "rtjjkliusfvwr." Which of the following best explains the weakness in his password?
Darina [25.2K]
I would say because it is hard to remember. Unless each one of those stands for a world, kind of like an acronym, then good luck remembering it!
3 0
2 years ago
Read 2 more answers
List 3 characteristics of the ideal encryption scheme
JulsSmile [24]
Three characteristics of an ideal encrytion scheme are:
1. The encryption sheme should be strong: the algorithm is imprevious to direct attack and attempts are derived.
2. The encryption scheme should create unique ciphertext from the same plaintext for each key permutation, among other traits.
3. It should take at least millions of years to break ideal encryption scheme, based on mathematical predictions.
6 0
3 years ago
Read 2 more answers
She has 12 circles and has to shade 3/4 how many does she shade​
Advocard [28]

Number of circles shaded = 3/4 x 12

                                           = 9 circles

Please mark Brainliest if this helps you! :)

5 0
3 years ago
Read 2 more answers
Which of the following is NOT used to describe rhythm?<br> Beat<br> Pitch<br> Tempo<br> Meter
PtichkaEL [24]

Answer:

pitch

Explanation:

Rhythm is, by definition, a strong, regular, repeated pattern of movement or sound. This means that it's a pattern of one thing.

Out of beat, pitch, tempo, and meter, three of them have one thing in common when corresponding to rhythm: monotony. Monotony is the same thing, unchanged in sound and movement.

For example, drawing a straight line continuously.

Beat is a main accent or rhythmic unit in music or poetry.

Pitch is the degree of highness or lowness of a tone.

Tempo is the speed at which a passage of music is or should be played.

Meter is  the rhythm of a piece of poetry, determined by the number and length of feet in a line.

When you listen to music, a rap, or poetry, you can "feel the beat." This means you can pick out the main sound being accentuated, like the "boom-boom-boom" or a clapping track.

Tempo is how fast something goes. A slow song played at a ballet may be different than a rap song, which is fast. Tempo is the speed.

Meter is the rhythm, usually in poetry. It's like a beat and other patterns in the poem.

Pitch is the one that is different. It changes the tone. For example, a high note vs. a low note. That's pitch. When someone swallows helium and talks, their voice is now "high-pitched" because it has a higher-sound tone.

Rhythm does not change—it's a pattern of beats, tempos, and rhythms. Unlike pitch, pitch is musical. Rhythm is not—it's just the pattern.

4 0
2 years ago
Read 2 more answers
The second phase of the writing process is when you draft your message. Choose the appropriate step in the drafting phase to com
Kamila [148]

Answer: a. Proofreading

Explanation:

Proofreading is an important part in the publication process. In this the carefully all the contents of the text are thoroughly read and errors are rectified and corrected like formatting issues, spelling mistakes, grammatical errors, inconsistencies, punctuation mistakes, and other mistakes are checked. Without proofreading no writing should be published.

According to the given situation, proofreading is the part of the revision process of the writing. This is done when the writing part is completed and the content is sent for electronic printing before electronic printing thorough revision of the content is required.

6 0
3 years ago
Read 2 more answers
Other questions:
  • What occurs in a steam engine?
    5·2 answers
  • wHAT ARE THE 5 LAYERS in the internet protocol stack andwhat are the principal responsibilities of eack of theselayers.?
    12·1 answer
  • Assume you have an Access database with five different tables, including various pieces of information about your client base. Y
    9·1 answer
  • Joe, a user, has purchased a new mobile device that uses a different OS than his previous one. Joe wants to copy his contacts an
    10·1 answer
  • Several new projects are being staffed by outside contractors who will be working on servers in the contractors’ office, not in
    5·2 answers
  • 1. Write a program that declares an array named alpha with 50 components of the type double. Initialize the array so that the fi
    8·1 answer
  • Decimal numbers is equivalent to binary 110
    5·1 answer
  • HELP PLS!!! In a presentation, what is layout?
    10·2 answers
  • JUST NEED TO KNOW WHO ALL DOSE EDGINUITY
    12·2 answers
  • What are the correct answers to the following questions?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!