A System programmer have access to computer room, it is
possible that he may undertake some unauthorised activities
at any time, due to his deep knowledge how can a control
build to avoid the risk?
Answer Posted / beginner
Limitation Of Access for the user, log generator should be
implemented in order to view the activities of the user.
Configuring proper firewalls nd blocking the unused ports.
Configuring the router by giving limited access to the user
are some of the ways
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What is remote access vpn?
How to implement PIX firewall security?
What are the different aspects of shadow it?
What is multicasting?
What is the idea behind the Bell-La Padula model?
What is utm firewall?
Name the port used by PING.
Explain what is difference between arp & rarp? How both of these protocols will work, and where it will use?
What is Imaging/ghosting?
How do we use rsa for both authentication and secrecy?
Is vpn traffic encrypted?
Diff bet ripv1 & ripv2?
How does a virtual private network (vpn) work?
What are the possible ways of data exchange
What is slowloris?