Which of the following is considered the MOST effective practice when securing printers or scanners in an enterprise environment?

A. Routine vulnerability scanning of peripherals
B. Install in a hardened network segment
C. Turn off the power to the peripherals at night
D. Enable print sharing only from workstations


Answer: A. Routine vulnerability scanning of peripherals

Computer Science & Information Technology

You might also like to view...

In echo checking, the receiver

a. repeats everything back to the transmitter for confirmation b. repeats only questionable data back to the transmitter for confirmation c. sends a checksum to the transmitter for confirmation and waits for it to be echoed back d. none of the above

Computer Science & Information Technology

Identification of compliance requirements is done during which of the following phases of the SDLC?

A) Initiation B) Development/acquisition C) Implementation/assessment D) Operations/maintenance

Computer Science & Information Technology

Watermarks display in which view(s)?

A) Read Mode B) Print Layout C) Web Layout D) Print Layout and Web Layout

Computer Science & Information Technology

The  ____ element marks content that appears at the start of a document.

A. section B. header C. footer D. article

Computer Science & Information Technology