A system requires administrators to be logged in as the “root” in order to make administrator changes. Which of
the following controls BEST mitigates the risk associated with this scenario?
Require that all administrators keep a log book of times and justification for accessing root
Encrypt all users home directories using file-level encryption
Implement a more restrictive password rotation policy for the shared root account
Force administrator to log in with individual accounts and switch to root
Add the administrator to the local group