Jane, an information security manager, often receives reports about the sharing of cipher lock codes to gain access to secure areas. Jane would like to implement a new control that would prevent the sharing of codes and limit access points to only key employees. Which of the following security controls would BEST mitigate this issue?

A. Use ACLs
B. Separation of duties
C. Install proximity readers
D. Time of day restrictions


Answer: C. Install proximity readers

Computer Science & Information Technology

You might also like to view...

What is the approximate value of log 1000000?

a. 10 b. 20 c. 50 d. 1000 e. none of the above

Computer Science & Information Technology

In Figure 23.12, the ISP has assigned one IP address to the site. Which is the assigned address?

What will be an ideal response?

Computer Science & Information Technology

What is an activation record?

What will be an ideal response?

Computer Science & Information Technology

The VBScript ________ function has the same purpose as JavaScript's window.prompt method.

a) MsgBox b) InputBox c) Prompt d) PromptBox

Computer Science & Information Technology