A company has recently had sensitive data stolen by a contractor who plugged a flash drive into a server. Which of the following is the BEST method to prevent future occurrences?
A. Disable any unused physical ports until needed
B. Implement a BIOS password on all the servers
C. Install chassis locks on all the servers
D. Restrict usage of flash drives in company policy
Ans: A. Disable any unused physical ports until needed
You might also like to view...
Every CSS style (or rule) consists of two parts: the selector and the ____.
A. extender B. declaration C. inverter D. introduction
Explain why collusion between employees and management in the commission of a fraud is difficult to both prevent and detect.
What will be an ideal response?
Hardware or software products that have been announced by vendors, but do not actually exist, are ____.
A. illegal B. adware C. shareware D. vaporware
The ________ keyword instructs Access to return the specific fields from one or more tables or queries
A) SELECT B) FROM C) WHERE D) ORDER BY