Evin thinks one of the computer systems where he works may h…

Evin thinks one of the computer systems where he works may have been compromised. He does not currently have a good way of determining if an unauthorized user logged in successfully. Which of the following can Evin implement that will, going forward, help him identify who logs in?

You have excellent technical acumen. Part of your responsibi…

You have excellent technical acumen. Part of your responsibilities where you work include overlooking daily operations as well as analyzing and designing security solutions in a specific area. You encounter a situation that needs to be escalated. Which of the following are you most likely to approach with the situation?

A work-study student works at the registrar’s office and is…

A work-study student works at the registrar’s office and is given limited access to a student database. The student is very technologically savvy and figures out a way of gaining additional privileges. The student is not pleased with one of their grades and changes it. Which of the following best describes the type of scenario this activity characterizes?