New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 212-89 Exam - Topic 3 Question 26 Discussion

Actual exam question for Eccouncil's 212-89 exam
Question #: 26
Topic #: 3
[All 212-89 Questions]

Which of the following is not a countermeasure to eradicate inappropriate usage

incidents?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Audra
4 months ago
Storing data far away? Sounds risky to me!
upvoted 0 times
...
Dolores
4 months ago
B and C are solid strategies, no doubt!
upvoted 0 times
...
An
4 months ago
I think D is a bit extreme, isn't it?
upvoted 0 times
...
Alline
4 months ago
Totally agree, avoiding VPNs just makes things worse!
upvoted 0 times
...
Stefania
4 months ago
A is definitely not a countermeasure.
upvoted 0 times
...
Lorrie
5 months ago
I feel like option D could also be a trick. Storing sensitive data far away sounds like a good practice, but is it really a countermeasure?
upvoted 0 times
...
Dorothy
5 months ago
I'm not entirely sure, but I remember a practice question where we discussed the importance of monitoring user activity logs. That makes me lean towards option A too.
upvoted 0 times
...
Justine
5 months ago
I think option A might be the right answer since avoiding VPNs doesn't seem like a countermeasure at all.
upvoted 0 times
...
Adolph
5 months ago
I vaguely recall that firewalls and IDS/IPS are definitely countermeasures, so I don't think option C is the answer.
upvoted 0 times
...
Rana
5 months ago
The key here is understanding the roles and responsibilities of the nurse and doctor. I'll need to analyze that carefully before selecting an answer.
upvoted 0 times
...
Tamra
5 months ago
Hmm, I'm not sure about this one. Conveying negative info could be tricky, but I'll try to analyze the different channels objectively.
upvoted 0 times
...
Tawanna
5 months ago
Ah, I see what they're getting at here. The Yellow Book does require the auditor to report on compliance with laws and regulations, which goes beyond the typical GAAS audit. So option C seems like the best choice, as it captures that expanded reporting responsibility.
upvoted 0 times
...
Myra
9 months ago
I'm with Moon on this one. Closely monitoring those user activity logs is key to nipping any issues in the bud.
upvoted 0 times
Lyla
8 months ago
User 3: We should also install firewall and IDS/IPS to block unauthorized services.
upvoted 0 times
...
Walton
8 months ago
User 2: Definitely, it helps in detecting any inappropriate usage incidents.
upvoted 0 times
...
Deangelo
9 months ago
User 1: I agree, monitoring user activity logs is crucial.
upvoted 0 times
...
...
Shayne
10 months ago
Haha, A is definitely the wrong answer. Avoiding VPNs? That's like telling someone to just leave their front door wide open.
upvoted 0 times
...
Mi
10 months ago
Option D seems too extreme. Sequestering sensitive data away in remote servers? That's just going to create more headaches than it solves.
upvoted 0 times
Georgeanna
8 months ago
User 3
upvoted 0 times
...
Alva
8 months ago
User 2
upvoted 0 times
...
Jeniffer
9 months ago
User 1
upvoted 0 times
...
...
Rikki
10 months ago
But wouldn't installing firewall and IDS/IPS also help in blocking inappropriate usage incidents?
upvoted 0 times
...
Moon
10 months ago
I'd go with B. Monitoring user activity logs is crucial to catching any inappropriate usage incidents. Gotta stay on top of that.
upvoted 0 times
Cruz
9 months ago
I agree, monitoring user activity logs is definitely important to catch any inappropriate usage incidents.
upvoted 0 times
...
Roxane
9 months ago
D) Always store the sensitive data in far located servers and restrict its access
upvoted 0 times
...
Venita
9 months ago
C) Install firewall and IDS/IPS to block services that violate the organization's policy
upvoted 0 times
...
Theola
9 months ago
B) Register the user activity logs and keep monitoring them regularly
upvoted 0 times
...
Merissa
10 months ago
A) Avoid VPN and other secure network channels
upvoted 0 times
...
...
Dell
10 months ago
No, I believe the correct answer is D) Always store the sensitive data in far located servers and restrict its access.
upvoted 0 times
...
Glory
10 months ago
Option A? Seriously? That's just asking for trouble. Avoiding secure channels is like inviting hackers to have a field day.
upvoted 0 times
...
Rikki
11 months ago
I think the answer is A) Avoid VPN and other secure network channels.
upvoted 0 times
...

Save Cancel