A security manager is creating an account management policy for a global organization with sales personnel who must access corporate network resources while traveling all over the world.
Which of the following practices is the security manager MOST likely to enforce with the policy? (Choose two.)
Click on the arrows to vote for the correct answer
A. B. C. D. E.BD.
The security manager is creating an account management policy for a global organization with sales personnel who must access corporate network resources while traveling all over the world. The manager needs to ensure that the policy is effective and secure, while also allowing the sales personnel to access the necessary resources.
A. Time-of-day restrictions: This practice allows access to network resources only during specific times of the day. This is an effective way to control access to resources and limit unauthorized access. It can be used to restrict access during non-business hours or when there is less staff available to monitor the network.
B. Password complexity: Password complexity is a practice of using strong and complex passwords that are difficult to guess or crack. This is an effective way to prevent unauthorized access to network resources. Strong passwords can help protect against brute-force attacks, where an attacker tries to guess the password by trying many different combinations.
C. Location-based authentication: Location-based authentication allows access to network resources based on the physical location of the user. This is an effective way to control access to resources and limit unauthorized access. It can be used to restrict access to resources when the user is outside a specific geographical area.
D. Group-based access control: Group-based access control is a practice of assigning access to network resources based on the user's group or role within the organization. This is an effective way to control access to resources and limit unauthorized access. It ensures that users only have access to the resources they need to perform their job duties.
E. Standard naming convention: Standard naming convention is a practice of using consistent naming conventions for user accounts, network resources, and other system components. This is an effective way to maintain consistency and organization within the system. It can help prevent confusion and reduce errors.
Based on the scenario provided, the security manager is MOST likely to enforce the following practices with the account management policy:
B. Password complexity: Given that the sales personnel are