Teresa was going through the records of people who could access her company’s web server. She came across many accounts belonging to people who no longer worked at the business.

What should she do with these accounts?

Teresa should ____ system rights from such accounts because they may pose a potential ____ risks.

1.
a. Revoke
b. Allot
c. Prioritize

2.
a. hardware and software
b. network and hardware
c. security and legal