You have been asked to revise the current security awareness and training program based on recent attacks that have occurred. One of the attacks occurred when a workstation's pointer operated on its own to move and open file. You need to address this attack in the revised program and provide procedures that users must follow. Which of the following should you instruct users to do if this attack
occurs?
A. Unplug the network cable.
B. Reboot the workstation.
C. Take a screen shot and email it to the IT department.
D. Contact the incident response team for direction.
D
Explanation: Users should contact the incident response team for direction when a workstation's pointer is operating on its own and opening files. This occurs when remote users connect to your computer using Remote Desktop, telnet, or a similar program. It is also advisable that the remote desktop protocol (RDP) be disabled on all workstations and only be enabled when the user needs help from a remote member of the IT department. The incident response team should be contacted to attempt to investigate the attack so that the attacker can be identified.
While unplugging the network cable would stop the attack, it will do nothing to prevent future attacks. Rebooting the workstation would also stop the attack but do nothing to prevent this from happening again.
Taking a screen shot and emailing it to the IT department will not do any good.
You might also like to view...
Assume s is "ABCABC", the method __________ returns a new string "aBCaBC".
a. s.toLowerCase(s) b. s.toLowerCase() c. s.replace('A', 'a') d. s.replace('a', 'A') e. s.replace("ABCABC", "aBCaBC")
A(n) ________ is a text note that is attached to a slide and can be view when the presentation is not running
A) annotation B) comment C) notation D) inscription
Match the criminal with the e-evidence associated with his or her crime
I. John Allen Mohammad A. Evidence of child pornography on computer II. Lisa Montgomery B. GPS data from car and cell phone III. Scott Peterson C. Digital recordings on a device in car IV. Alejandro Avila D. E-mail communication between criminal and victim
When you change a value on which a chart is dependent, Excel immediately redraws the chart based on the new value.
Answer the following statement true (T) or false (F)