An organization has implemented a control for Controlled Use of Administrative Privilege. The control requires users to enter a password from their own user account before being allowed elevated privileges, and that no client applications (e.g. web browsers, e-mail clients) can be run with elevated privileges. Which of the following actions will validate this control is implemented properly?
Ligia
2 months agoMayra
2 months agoFrancene
2 months agoEladia
3 months agoLouis
3 months agoRolande
3 months agoIvette
3 months agoCatrice
4 months agoGilma
4 months agoLavelle
4 months agoAja
4 months agoElizabeth
4 months agoMichell
4 months agoStephaine
5 months agoTeddy
5 months agoKing
5 months agoLili
6 months agoRory
6 months agoFrank
5 months agoBeata
6 months agoCary
5 months agoCora
5 months agoSamira
5 months ago