A copy of a highly confidential salary report was recently found on a printer in the IT department. The human resources department does not have this specific printer mapped to its devices, and it is suspected that an employee in the IT department browsed to the share where the report was located and printed it without authorization. Which of the following technical controls would be the BEST choice to immediately prevent this from happening again?

A. Implement a DLP solution and classify the report as confidential, restricting access only to human resources staff
B. Restrict access to the share where the report resides to only human resources employees and enable auditing
C. Have all members of the IT department review and sign the AUP and disciplinary policies
D. Place the human resources computers on a restricted VLAN and configure the ACL to prevent access from the IT department


Answer: B. Restrict access to the share where the report resides to only human resources employees and enable auditing

Computer Science & Information Technology

You might also like to view...

MC Attribute________contains a node’s next sibling.

a) nextSibling. b) nextChild. c) nextNode. d) sibling.

Computer Science & Information Technology

By default, a summary report also includes a detail area showing unsummarized fields at the record level. This level can be hidden in either Layout or Design view

Indicate whether the statement is true or false

Computer Science & Information Technology

The ____ print style prints a page for each contact.

A. Card B. Memo C. Phone Directory D. Small Booklet

Computer Science & Information Technology

Wayne is using the command line and is in his home directory. Which of the following will display a list of all files and their sizes from his home directory? (Choose two.)

A. ls -ax B. ls -al ~ C. ls -ax ~ D. ls -al /home/wayne

Computer Science & Information Technology