正解:D
To restrict activity from employees after hours, the systems administrator should implement time-of-day restrictions. This method allows access to network resources to be limited to specific times, ensuring that employees can only access systems during approved working hours. This is an effective part of a defense-in- depth strategy to mitigate risks associated with unauthorized access during off-hours, which could be a time when security monitoring might be less stringent.
* Time-of-day restrictions: These control access based on the time of day, preventing users from logging in or accessing certain systems outside of designated hours.
* Role-based restrictions: Control access based on a user's role within the organization.
* Attribute-based restrictions: Use various attributes (such as location, department, or project) to determine access rights.
* Mandatory restrictions: Typically refer to non-discretionary access controls, such as those based on government or organizational policy.