A company has recently had sensitive data stolen by a contractor who plugged a flash drive into a server. Which of the following is the BEST method to prevent future occurrences?
A. Disable any unused physical ports until needed
B. Implement a BIOS password on all the servers
C. Install chassis locks on all the servers
D. Restrict usage of flash drives in company policy
Ans: A. Disable any unused physical ports until needed
You might also like to view...
Every CSS style (or rule) consists of two parts: the selector and the ____.
A. extender B. declaration C. inverter D. introduction
The ________ keyword instructs Access to return the specific fields from one or more tables or queries
A) SELECT B) FROM C) WHERE D) ORDER BY
Explain why collusion between employees and management in the commission of a fraud is difficult to both prevent and detect.
What will be an ideal response?
Hardware or software products that have been announced by vendors, but do not actually exist, are ____.
A. illegal B. adware C. shareware D. vaporware