.A technician is auditing the security posture of an organization. The audit shows that many of the
users have the ability to access the company’s accounting information. Which of the following
should the technician recommend to address this problem?
A.
Changing the user rights and security groups
B.
Implementing a host based intrusion detection system
C.
Changing file level audit settings
D.
Implementing a host based intrusion prevention system