In: Computer Science
A security administrator has been tasked with plementing controls that meet management goals Drag and drop the appropriate control used to accomplish the account management goal Options may be used once or not at all.
Easily diferentiate between mobile devices and servers in reports
Enforce password complexity requirements
Determine if devices used by terminated employees are returned
Identity which employees have access to sensitive file shares
1.Standard naming convention
Naming conventions are set of rules to be followed while naming a device or a function. Naming conventions are followed in reports to differentiate between mobile devices and servers.
2. Group policy
Group policy enforces password complexity requirements. Password complexity includes the contraints which need to be followed while creating passwords. The constaints can be minimum number of characters in password, usage of special characters in password and many more.
3. Usage auditing and review
Usage auditing and review is done to ensure the usage of devices by terminated employees. It keeps track of the employees and the devices which are being used and ensures that the devices are returned.
4. Permission auditing and review
Sometimes there is a need to allow the access of sensitive data to a specific employee. Permission auditing and review is responsible for granting and revoking permissions to access sensitive data for employees.