A System programmer have access to computer room, it is
possible that he may undertake some unauthorised activities
at any time, due to his deep knowledge how can a control
build to avoid the risk?
Answer Posted / beginner
Limitation Of Access for the user, log generator should be
implemented in order to view the activities of the user.
Configuring proper firewalls nd blocking the unused ports.
Configuring the router by giving limited access to the user
are some of the ways
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
who is a hacker?
What are the possible ways of data exchange
What are the types of LAN cables used? What is a cross cable?
How does the HTTP handle state?
What are major types of networks and explain
explain how do we do authentication with message digest(md5)? (Usually md is used for finding tampering of data)
What is IPCONFIG command? Why it is used?
What is ospf protocol
What is difference between discretionary access control and mandatory access control?
What is mesh network
congestion at network due to buffer overflows and packet dropping leads to a message confidentiality threat named.....
Describe a TCP connection sequence
What is the general data protection regulation (gdpr)?
Explain what is the role of single sign on in authentication technologies?
What is kerberos protocol?