After a merger between two companies a security analyst has been asked to ensure that the organization’s systems are secured against infiltration by any former
employees that were terminated during the transition. Which of the following actions are MOST appropriate to harden applications against infiltration by former
employees? (Select TWO)
A.
Monitor VPN client access
B.
Reduce failed login settings
C.
Develop and implement updated access control policies
D.
Review and address invalid login attempts
E.
Increase password complexity requirements
F.
Assess and eliminate inactive accounts