Which security rule should be implemented to minimize risk of malware infection of endpoint systems?
A. Configure a software firewall.
B. Disable the use of USB storage devices.
C. Encrypt all file storage.
D. Audit user activity.
Answer: B. Disable the use of USB storage devices.
You might also like to view...
The _____ requires telephone companies to turn over customer information, including numbers called, without a court order if the Federal Bureau of Investigation (FBI) claims that the records are relevant to a terrorism investigation.
A. Cable Act of 1992 B. Electronic Communications Privacy Act of 1986 C. Gramm-Leach-Bliley Act of 1999 D. USA Patriot Act of 2001
Using Formatting on data makes it difficult to read and tends to obscure meaningful details
Indicate whether the statement is true or false
What is the term for the servers just below the DNS root servers?
A. domain controllers B. second-level domain server C. top-level domain servers D. WINS server
Operating systems that permit each user to run multiple programs are referred to as multiuser systems.
Answer the following statement true (T) or false (F)