Previous
Previous

A.9.4.4: Use of Privileged Utility Programs

Next
Next

A.9.4.2: Secure Log-on Procedures