Operating System Security User Authentication
Q What is not a good practice for user administration?
  • A A. Isolating a system after a compromise
  • B B. Perform random auditing procedures
  • C C. Granting privileges on a per host basis
  • D D. Using telnet and ftp for remote access
Leave a Comment