A newly-hired CSO is faced with improving security for your company with low morale and numerous disgruntled employees. After reviewing the situation for several weeks, the CSO publishes a more comprehensive security policy with associated standards. Which issue could be addressed through the use of technical controls specified in the new security policy?
A. an employee posting negative comments about the company from a personal mobile device
B. an employee remotely configuring the database server from a relative's home during work hours
C. a third party cloning some of the company's externally facing web pages and creating lookalike sites
D. an employee publishing negative information and stories about company management on social media
B
Explanation: Of the issues listed, the only issues that could be addresses through the use of technical controls is an employee remotely configuring the database server from a relative's home during work hours. You can configure a specific control to prevent this from occurring.
You cannot configure a technical control that prevents an employee from posting negative comments about the company from a personal mobile device. However, you can implement a security policy that specifically spells out any repercussions that may occur as a result of this happening.
You cannot configure a technical control that will prevent a third party from cloning some of the company's externally facing web pages and creating lookalike sites. The only thing you can do in this case is to educate your users to ensure that they know the real web address for your company.
You cannot configure a technical control that will prevent an employee from publishing negative information and stories about company management on social media. You can, however, implement a security policy that specifically spells out any repercussions that may occur as a result of this happening.
You might also like to view...
________ involves reworking programs to make them clearer and easier to maintain while preserving their correctness and functionality.
a. Object-oriented programming b. Refactoring c. Agile software development d. LAMP
In regards to default arguments, which of the following is false?
a. When an argument is omitted in a function call, the default value of that argument is automatically inserted by the compiler and passed in the function call. b. They must be the rightmost (trailing) arguments in a function’s parameter list. c. Default values can be constants. d. Default values cannot be global variables or function calls.
A situation in which every object of a class A has a pointer to an object of a class B, and the objects of the class B may outlive objects of class A, is called
A) a has-A relation. B) aggregation. C) composition. D) an is=A relation. E) None of the above
A ____ contains a single piece of information, such as a name, birth date, or zip code.
A. character B. field C. file D. record