?Your company has acquired Joggers PLC, a smaller company. The integration of the information systems can take up to 6 months, and until then Joggers PLC workers will continue following their policies. You have been tasked with ensuring that their IT practices will be safe and lead to a secure system. What advice would you give your manager regarding information security policies?
What will be an ideal response?
?I would ensure Joggers' infrastructure is well protected by firewalls, anti-virus software, and updated applications. I would enforce a password policy to make guessing the passwords improbable. I would recommend they institute a data backup policy that will make daily, weekly, and monthly backups of all the data. I would also make data access restricted to users' roles.
You might also like to view...
What does a layer clipping mask do?
What will be an ideal response?
Which theory is used with surge strips?
A) Chaos theory B) Logical theory C) Binary theory D) Theory of least resistance
Using the Auditpol.exe command-line command ________, you can display the current auditing policy
a. /get b. /list c. /show d. /retrieve
Which of the following firewall rule groups will enable the use of the Performance Monitor snap-in?
A. Performance Logs and Alerts B. Remote Service Management C. Remote Event Log Management D. File and Printer Sharing