Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 212-89 Topic 3 Question 26 Discussion

Actual exam question for Eccouncil's 212-89 exam
Question #: 26
Topic #: 3
[All 212-89 Questions]

Which of the following is not a countermeasure to eradicate inappropriate usage

incidents?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Myra
2 months ago
I'm with Moon on this one. Closely monitoring those user activity logs is key to nipping any issues in the bud.
upvoted 0 times
Lyla
21 days ago
User 3: We should also install firewall and IDS/IPS to block unauthorized services.
upvoted 0 times
...
Walton
22 days ago
User 2: Definitely, it helps in detecting any inappropriate usage incidents.
upvoted 0 times
...
Deangelo
2 months ago
User 1: I agree, monitoring user activity logs is crucial.
upvoted 0 times
...
...
Shayne
2 months ago
Haha, A is definitely the wrong answer. Avoiding VPNs? That's like telling someone to just leave their front door wide open.
upvoted 0 times
...
Mi
3 months ago
Option D seems too extreme. Sequestering sensitive data away in remote servers? That's just going to create more headaches than it solves.
upvoted 0 times
Georgeanna
1 months ago
User 3
upvoted 0 times
...
Alva
1 months ago
User 2
upvoted 0 times
...
Jeniffer
2 months ago
User 1
upvoted 0 times
...
...
Rikki
3 months ago
But wouldn't installing firewall and IDS/IPS also help in blocking inappropriate usage incidents?
upvoted 0 times
...
Moon
3 months ago
I'd go with B. Monitoring user activity logs is crucial to catching any inappropriate usage incidents. Gotta stay on top of that.
upvoted 0 times
Cruz
2 months ago
I agree, monitoring user activity logs is definitely important to catch any inappropriate usage incidents.
upvoted 0 times
...
Roxane
2 months ago
D) Always store the sensitive data in far located servers and restrict its access
upvoted 0 times
...
Venita
2 months ago
C) Install firewall and IDS/IPS to block services that violate the organization's policy
upvoted 0 times
...
Theola
2 months ago
B) Register the user activity logs and keep monitoring them regularly
upvoted 0 times
...
Merissa
2 months ago
A) Avoid VPN and other secure network channels
upvoted 0 times
...
...
Dell
3 months ago
No, I believe the correct answer is D) Always store the sensitive data in far located servers and restrict its access.
upvoted 0 times
...
Glory
3 months ago
Option A? Seriously? That's just asking for trouble. Avoiding secure channels is like inviting hackers to have a field day.
upvoted 0 times
...
Rikki
4 months ago
I think the answer is A) Avoid VPN and other secure network channels.
upvoted 0 times
...

Save Cancel