Jane, an information security manager, often receives reports about the sharing of cipher lock codes to gain access to secure areas. Jane would like to implement a new control that would prevent the sharing of codes and limit access points to only key employees. Which of the following security controls would BEST mitigate this issue?
A. Use ACLs
B. Separation of duties
C. Install proximity readers
D. Time of day restrictions
Answer: C. Install proximity readers
Computer Science & Information Technology
You might also like to view...
What is the approximate value of log 1000000?
a. 10 b. 20 c. 50 d. 1000 e. none of the above
Computer Science & Information Technology
In Figure 23.12, the ISP has assigned one IP address to the site. Which is the assigned address?
What will be an ideal response?
Computer Science & Information Technology
What is an activation record?
What will be an ideal response?
Computer Science & Information Technology
The VBScript ________ function has the same purpose as JavaScript's window.prompt method.
a) MsgBox b) InputBox c) Prompt d) PromptBox
Computer Science & Information Technology