Assets, Threats, and Vulnerabilities | Weekly challenge 2 Quiz |
An employee reports that they cannot log into the payroll system with their access credentials. The employee does not recall changing their username or password. As a security analyst, you are asked to review access logs to investigate whether a breach occurred. What information are you able to review as a data custodian in this situation? Select two answers.
- Any coworkers’ contact information
- The IP address of the computer used to log in
- The time the user signed in and out
- Any payroll access credentials the user has stored on the server