Which security rule should be implemented to minimize risk of malware infection of endpoint systems?

A. Configure a software firewall.
B. Disable the use of USB storage devices.
C. Encrypt all file storage.
D. Audit user activity.


Answer: B. Disable the use of USB storage devices.

Computer Science & Information Technology

You might also like to view...

The _____ requires telephone companies to turn over customer information, including numbers called, without a court order if the Federal Bureau of Investigation (FBI) claims that the records are relevant to a terrorism investigation.

A. Cable Act of 1992 B. Electronic Communications Privacy Act of 1986 C. Gramm-Leach-Bliley Act of 1999 D. USA Patriot Act of 2001

Computer Science & Information Technology

Using Formatting on data makes it difficult to read and tends to obscure meaningful details

Indicate whether the statement is true or false

Computer Science & Information Technology

What is the term for the servers just below the DNS root servers?

A. domain controllers B. second-level domain server C. top-level domain servers D. WINS server

Computer Science & Information Technology

Operating systems that permit each user to run multiple programs are referred to as multiuser systems.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology