The IT department is tasked to implement a system that controls what a user can and cannot do on the corporate network. Which process should be implemented to meet the requirement?
- user login auditing
- a set of attributes that describes user access rights
- observations to be provided to all employees
- a biometric fingerprint reader
Explanation: Access control prevents unauthorized user from gaining access to sensitive data and networked systems. There are several technologies used to implement effective access control strategies.
Exam with this question: Cybersecurity Essentials FINAL Quiz Answers Full
Exam with this question: Network Defense (NetDef) Course Final Exam Answers
Please login or Register to submit your answer