Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 212-89 Topic 3 Question 26 Discussion

Actual exam question for Eccouncil's 212-89 exam
Question #: 26
Topic #: 3
[All 212-89 Questions]

Which of the following is not a countermeasure to eradicate inappropriate usage

incidents?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Myra
21 days ago
I'm with Moon on this one. Closely monitoring those user activity logs is key to nipping any issues in the bud.
upvoted 0 times
Deangelo
5 days ago
User 1: I agree, monitoring user activity logs is crucial.
upvoted 0 times
...
...
Shayne
28 days ago
Haha, A is definitely the wrong answer. Avoiding VPNs? That's like telling someone to just leave their front door wide open.
upvoted 0 times
...
Mi
1 months ago
Option D seems too extreme. Sequestering sensitive data away in remote servers? That's just going to create more headaches than it solves.
upvoted 0 times
Jeniffer
22 days ago
User 1
upvoted 0 times
...
...
Rikki
2 months ago
But wouldn't installing firewall and IDS/IPS also help in blocking inappropriate usage incidents?
upvoted 0 times
...
Moon
2 months ago
I'd go with B. Monitoring user activity logs is crucial to catching any inappropriate usage incidents. Gotta stay on top of that.
upvoted 0 times
Cruz
9 days ago
I agree, monitoring user activity logs is definitely important to catch any inappropriate usage incidents.
upvoted 0 times
...
Roxane
10 days ago
D) Always store the sensitive data in far located servers and restrict its access
upvoted 0 times
...
Venita
11 days ago
C) Install firewall and IDS/IPS to block services that violate the organization's policy
upvoted 0 times
...
Theola
18 days ago
B) Register the user activity logs and keep monitoring them regularly
upvoted 0 times
...
Merissa
28 days ago
A) Avoid VPN and other secure network channels
upvoted 0 times
...
...
Dell
2 months ago
No, I believe the correct answer is D) Always store the sensitive data in far located servers and restrict its access.
upvoted 0 times
...
Glory
2 months ago
Option A? Seriously? That's just asking for trouble. Avoiding secure channels is like inviting hackers to have a field day.
upvoted 0 times
...
Rikki
2 months ago
I think the answer is A) Avoid VPN and other secure network channels.
upvoted 0 times
...

Save Cancel