Sara, an employee, tethers her smartphone to her work PC to bypass the corporate web security gateway while connected to the LAN. While Sara is out at lunch her PC is compromised via the tethered connection and corporate data is stolen. Which of the following would BEST prevent this from occurring again?
A. Disable the wireless access and implement strict router ACLs
B. Reduce restrictions on the corporate web security gateway
C. Security policy and threat awareness training
D. Perform user rights and permissions reviews
Answer: C. Security policy and threat awareness training
You might also like to view...
Wardrivers do not actually access the wireless networks they locate
Indicate whether the statement is true or false
Which of the following statements about inserting an outline is NOT true?
A) Heading 1 style is applied to the slide titles. B) Heading 2 style is applied to the bulleted text. C) Objects such as pictures, charts, SmartArt, and shapes do not display. D) Heading 3 style is applied to paragraphs.
Which of the following is NOT an editing restriction that you can set in Word?
A) Preventing users from making changes to a letterhead template. B) Preventing users from formatting the document. C) Restricting data entry to fields. D) Restricting data entry to unprotected areas of a form.
The Find and Replace feature searches the cells in a worksheet—or in a selected range—for matches, and then replaces each match with a replacement value of your choice
Indicate whether the statement is true or false