What is not a good practice for user administration?
(a) Isolating a system after a compromise
(b) Perform random auditing procedures
(c) Granting privileges on a per host basis
(d) Using telnet and FTP for remote access
This question was addressed to me by my school teacher while I was bunking the class.
This question is from Security in chapter Security of Operating System