Which of the following is considered the MOST effective practice when securing printers or scanners in an enterprise environment?
A. Routine vulnerability scanning of peripherals
B. Install in a hardened network segment
C. Turn off the power to the peripherals at night
D. Enable print sharing only from workstations
Answer: A. Routine vulnerability scanning of peripherals
You might also like to view...
In echo checking, the receiver
a. repeats everything back to the transmitter for confirmation b. repeats only questionable data back to the transmitter for confirmation c. sends a checksum to the transmitter for confirmation and waits for it to be echoed back d. none of the above
Identification of compliance requirements is done during which of the following phases of the SDLC?
A) Initiation B) Development/acquisition C) Implementation/assessment D) Operations/maintenance
Watermarks display in which view(s)?
A) Read Mode B) Print Layout C) Web Layout D) Print Layout and Web Layout
The ____ element marks content that appears at the start of a document.
A. section B. header C. footer D. article