Which of the following computer controls would provide the best evidence that unauthorized users are not accessing specific computer programs and files?
A. Using passwords requiring access to those programs and files.
B. Periodically reviewing and confirming access rights for the organization’s users.
C. Monitoring actual user activity through a program log and comparing that activity to authorized levels.
D. Ensuring that access to programs and files is removed for recently terminated employees.
We need at least 10 more requests to produce the solution.
0 / 10 have requested this problem solution
The more requests, the faster the answer.