Which of the following measures is the MOST effective deterrent against disgruntled stall abusing their
privileges?
A.
Layered defense strategy
B.
System audit log monitoring
C.
Signed acceptable use policy
D.
High-availability systems
Explanation:
A layered defense strategy would only prevent those activities that are outside of the user’s privileges. A signed acceptable use policy is often an effective deterrent against malicious activities because of the potential for termination of employment and/or legal actions being taken against the individual. System audit log monitoring is after the fact and may not be effective. High-availability systems have high costs and are not always feasible for all devices and components or systems.