PrepAway - Latest Free Exam Questions & Answers

which of the following should be implemented?

A cyber security administrator receives a list of IPs that have been reported as attempting to
access the network. To identify any possible successful attempts across the enterprise, which of
the following should be implemented?

PrepAway - Latest Free Exam Questions & Answers

A.
Monitor authentication logs

B.
Disable unnecessary accounts

C.
Time of day restrictions

D.
Separation of duties


Leave a Reply