Q
What is not a good practice for user administration?
-
A
A. Isolating a system after a compromise
-
B
B. Perform random auditing procedures
-
C
C. Granting privileges on a per host basis
-
D
D. Using telnet and ftp for remote access
Correct Answer:
D. D. Using telnet and ftp for remote access
Explanation:
Telnet and FTP are not encrypted and can be compromised.