A company storing data on a secure server wants to ensure it is legally able to dismiss and prosecute staff who intentionally access the server via Telnet and illegally tamper with customer data. Which of the following administrative controls should be implemented to BEST achieve this?

  • Warning banners
  • Restricted interface
  • Command shell restriction
  • Session output pipe to /dev/null

Your Score:
Network Security
Compliance and Operational Security
Threats and Vulnerabilities
Application, Data and Host Security
Access Control and Identity Management
Cryptography
CompTIA Security+ SY0-401
  • Network Security
  • Compliance and Operational Security
    • This question is filed here
  • Threats and Vulnerabilities
  • Application, Data and Host Security
  • Access Control and Identity Management
  • Cryptography