Which of the following is not a good practice for controlling computer access?

Prepare for the CITI Program HSR Social and Behavioral Education (SBE) Exam with flashcards and multiple-choice questions, each with hints and explanations. Get ready to excel in your certification!

Sharing user-ID or password undermines security protocols and is not a good practice for controlling computer access. Good security practices are built on the foundation of unique identifiers for each user and personal accountability. When users share their login credentials, it becomes difficult to track who accessed the system or made changes, which can lead to potential data breaches or misuse.

In contrast, unique passwords for each user, two-factor authentication, and regular monitoring of access logs are effective strategies for enhancing security. Unique passwords help ensure that even if one password is compromised, others remain secure. Two-factor authentication adds an extra layer of security by requiring users to provide additional verification, making unauthorized access more difficult. Monitoring access logs allows organizations to detect and respond to suspicious activities promptly, thereby maintaining the integrity of their systems.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy