A company storing data on a secure server wants to ensure it is legally able to dismiss and
prosecute staff who intentionally access the server via Telnet and illegally tamper with customer
data. Which of the following administrative controls should be implemented to BEST achieve this?
A.
Command shell restrictions
B.
Restricted interface
C.
Warning banners
D.
Session output pipe to /dev/null