which of the following should be implemented?

A cyber security administrator receives a list of IPs that have been reported as attempting to access the
network. To identify any possible successful attempts across the enterprise, which of the following should be
implemented?

A cyber security administrator receives a list of IPs that have been reported as attempting to access the
network. To identify any possible successful attempts across the enterprise, which of the following should be
implemented?

A.
Monitor authentication logs

B.
Disable unnecessary accounts

C.
Time of day restrictions

D.
Separation of duties



Leave a Reply 0

Your email address will not be published. Required fields are marked *