A System programmer have access to computer room, it is
possible that he may undertake some unauthorised activities
at any time, due to his deep knowledge how can a control
build to avoid the risk?
Answer Posted / beginner
Limitation Of Access for the user, log generator should be
implemented in order to view the activities of the user.
Configuring proper firewalls nd blocking the unused ports.
Configuring the router by giving limited access to the user
are some of the ways
Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What is http flood?
Is vpn traffic encrypted?
What are worms?
Explain what is the role of single sign on in authentication technologies?
What is terminal emulation, in which layer it comes
What a security mean in your sense?
explain how do we do authentication with message digest(md5)? (Usually md is used for finding tampering of data)
What is threat-focused ngfw?
In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?
Difference between the communication and transmission.
What type of network do you use at home?
Define the meaning of an Authentication.
What is IPCONFIG command? Why it is used?
What is difference between baseband and broadband transmission
What is frame relay, in which layer it comes