Inactive identifiers pose a risk to organizational information because attackers may exploit an inactive identifier to gain undetected access to organizational devices. The owners of the inactive accounts may not notice if unauthorized access to the account has been obtained.
0 of 1 Questions completed
You have already completed the checklist before. Hence you can not start it again.
Checklist is loading…
You must sign in or sign up to start the checklist.
You must first complete the following:
0 of 1 Questions answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
1. Question2 point(s)
3.5.6 Assessment Objectives / Determination Statements by Requirements Checklist
(confirm all that apply)