Which of the following measures is the MOST effective deterrent against disgruntled stall abusing their privileges?

Which of the following measures is the MOST effective deterrent against disgruntled stall abusing
their privileges?

Which of the following measures is the MOST effective deterrent against disgruntled stall abusing
their privileges?

A.
Layered defense strategy

B.
System audit log monitoring

C.
Signed acceptable use policy

D.
High-availability systems

Explanation:

A layered defense strategy would only prevent those activities that are outside of the user’s
privileges. A signed acceptable use policy is often an effective deterrent against malicious

activities because of the potential for termination of employment and/or legal actions being taken
against the individual. System audit log monitoring is after the fact and may not be effective. Highavailability systems have high costs and are not always feasible for all devices and components or
systems.



Leave a Reply 0

Your email address will not be published. Required fields are marked *