A System programmer have access to computer room, it is
possible that he may undertake some unauthorised activities
at any time, due to his deep knowledge how can a control
build to avoid the risk?
Answer Posted / beginner
Limitation Of Access for the user, log generator should be
implemented in order to view the activities of the user.
Configuring proper firewalls nd blocking the unused ports.
Configuring the router by giving limited access to the user
are some of the ways
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What is BSOD?
What are the types of Transmission media
What is remote access vpn?
What is the role of single sign on in authentication technologies?
Is vpn traffic encrypted?
explain how do we do authentication with message digest(md5)? (Usually md is used for finding tampering of data)
What is trojan virus?
who is a hacker?
How to implement PIX firewall security?
How to you keep yourself updated on network security ?
Name the port used by PING.
Difference between the communication and transmission.
What is Cross Site Request Forgery and how to defend against it?
What is mesh network
What is meant by port blocking within lan?