A company has recently had sensitive data stolen by a contractor who plugged a flash drive into a server. Which of the following is the BEST method to prevent future occurrences?

A. Disable any unused physical ports until needed
B. Implement a BIOS password on all the servers
C. Install chassis locks on all the servers
D. Restrict usage of flash drives in company policy


Ans: A. Disable any unused physical ports until needed

Computer Science & Information Technology

You might also like to view...

Every CSS style (or rule) consists of two parts: the selector and the ____.

A. extender B. declaration C. inverter D. introduction

Computer Science & Information Technology

Explain why collusion between employees and management in the commission of a fraud is difficult to both prevent and detect.

What will be an ideal response?

Computer Science & Information Technology

Hardware or software products that have been announced by vendors, but do not actually exist, are ____.

A. illegal B. adware C. shareware D. vaporware

Computer Science & Information Technology

The ________ keyword instructs Access to return the specific fields from one or more tables or queries

A) SELECT B) FROM C) WHERE D) ORDER BY

Computer Science & Information Technology