After a merger, it was determined that several individuals could perform the tasks of a network administrator in the merged organization.
Which of the following should have been performed to ensure that employees have proper access?
Click on the arrows to vote for the correct answer
A. B. C. D.D.
After a merger, it's important to ensure that employees have the proper access to network resources. This is necessary to prevent unauthorized access, data breaches, and other security incidents. To address this concern, several measures can be taken, including time-of-day restrictions, change management, periodic auditing of user credentials, and user rights and permission review.
Time-of-day restrictions limit the hours during which certain network resources can be accessed. For example, a network administrator may only be allowed to access certain resources during normal business hours. This can help to prevent unauthorized access during off-hours when security measures may be more relaxed.
Change management is the process of controlling changes to the network infrastructure. This involves planning, testing, and implementing changes in a controlled manner to prevent disruptions and ensure that changes are consistent with the organization's security policies and procedures.
Periodic auditing of user credentials involves reviewing user accounts and their associated privileges to ensure that they are still valid and appropriate. This helps to prevent unauthorized access by employees who no longer require access to certain network resources.
User rights and permission review involves reviewing the access rights and permissions assigned to individual users. This helps to ensure that employees have only the access they need to perform their job functions, and that their access rights are consistent with the organization's security policies and procedures.
In the context of the question, the best answer is D. User rights and permission review. This is because it directly addresses the issue of ensuring that employees have proper access by reviewing their access rights and permissions. While time-of-day restrictions, change management, and periodic auditing are also important security measures, they do not specifically address the issue of user access rights and permissions.