Alejandro reviewed the user access protocols for Ponder Products. Alejandro is concerned that the accounting system could be subject to malicious attacks on user accounts that are currently protected with a username and password. The system has the capability to send a message to a user's cell phone or email address. How could Alejandro use the messaging capabilities of the system to further protect it from attack? Enable two-factor authentication Enable fingerprint scanners Enable read-only access for all users Enable administrator access for all users

Accounting Information Systems
10th Edition
ISBN:9781337619202
Author:Hall, James A.
Publisher:Hall, James A.
Chapter12: Electronic Commerce Systems
Section: Chapter Questions
Problem 10MCQ
icon
Related questions
Question
Alejandro reviewed the user access
protocols for Ponder Products.
Alejandro
is concerned that the
accounting system could be subject to
malicious attacks on user accounts that
are currently protected with a
username and password. The system
has the capability to send a message
to a user's cell phone or email address.
How could Alejandro use the
messaging capabilities of the system
to further protect it from attack?
Enable two-factor
authentication
Enable fingerprint scanners
Enable read-only access for
all users
Enable administrator access
for all users
Transcribed Image Text:Alejandro reviewed the user access protocols for Ponder Products. Alejandro is concerned that the accounting system could be subject to malicious attacks on user accounts that are currently protected with a username and password. The system has the capability to send a message to a user's cell phone or email address. How could Alejandro use the messaging capabilities of the system to further protect it from attack? Enable two-factor authentication Enable fingerprint scanners Enable read-only access for all users Enable administrator access for all users
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Types of cyber attacks
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, accounting and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Accounting Information Systems
Accounting Information Systems
Accounting
ISBN:
9781337619202
Author:
Hall, James A.
Publisher:
Cengage Learning,
Principles of Accounting Volume 1
Principles of Accounting Volume 1
Accounting
ISBN:
9781947172685
Author:
OpenStax
Publisher:
OpenStax College
Pkg Acc Infor Systems MS VISIO CD
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:
9781133935940
Author:
Ulric J. Gelinas
Publisher:
CENGAGE L