List three practices that should be followed when using a keyed padlock.
What will be an ideal response?
The following practices are all valid when using a keyed padlock:?• Appoint a key custodian who's responsible for distributing keys.
• Stamp sequential numbers on each duplicate key.
• Maintain a registry listing which key is assigned to which authorized person.
• Conduct a monthly audit to ensure that no authorized person has lost a key.
• Take an inventory of all keys when the custodian changes.
• Place keys in a lockable container accessible only to the lab manager and designated
key custodian.
• Maintain the same level of security for keys as for evidence containers.
• Change locks and keys annually; if a key is missing, replace all associated locks and
the key.
• Do not use a master key for several locks.
You might also like to view...
Which of the following side headings applies the correct capitalization format of side headings?
A. MARGINS FOR REPORTS B. Margins For Reports C. Margins for Reports D. Margins for reports
You can examine the configuration register by typing ____ at either the enable mode or user mode prompt.
A. show configuration B. show reg C. show version D. show register
_____ is the replication and hosting of physical or virtual servers and other necessary hardware and software by a third-party service provider to deliver information technology services in the event of a disaster.
a. Disaster recovery as a service (DRaaS) b. Disaster recovery as an event (DRaaE) c. Disaster recovery as a platform (DRaaPL) d. Disaster recovery as a solution (DRaaSL)
A stack buffer overflow is also referred to as ___________ .
A. stack framing B. stack smashing C. stack shocking D. stack running