which of the following risk mitigation strategies?

A security administrator has been tasked to ensure access to all network equipment is controlled
by a central server such as TACACS+. This type of implementation supports which of the following
risk mitigation strategies?

A security administrator has been tasked to ensure access to all network equipment is controlled
by a central server such as TACACS+. This type of implementation supports which of the following
risk mitigation strategies?

A.
User rights and permissions review

B.
Change management

C.
Data loss prevention

D.
Implement procedures to prevent data theft



Leave a Reply 0

Your email address will not be published. Required fields are marked *