Which of the following MUST system and database administrators be aware of and apply when configuring systems used for storing personal employee data?
Which of the following methods provides the MOST protection for user credentials?
Which of the following is an example of two-factor authentication?
Refer to the information below to answer the question.
A new employee is given a laptop computer with full administrator access. This employee does not have a personal computer at home and has a child that uses the computer to send and receive e-mail, search the web, and use instant messaging. The organization’s Information Technology (IT) department discovers that a peer-to-peer program has been installed on the computer using the employee's access.
Which of the following could have MOST likely prevented the Peer-to-Peer (P2P) program from being installed on the computer?