PrepAway - Latest Free Exam Questions & Answers

which of the following should be implemented?

A cyber security administrator receives a list of IPs that have been reported as attempting to access the
network. To identify any possible successful attempts across the enterprise, which of the following should be
implemented?

PrepAway - Latest Free Exam Questions & Answers

A.
Monitor authentication logs

B.
Disable unnecessary accounts

C.
Time of day restrictions

D.
Separation of duties

PrepAway - Latest Free Exam Questions & Answers

Leave a Reply