I feel pretty confident about this one. Leaving sensitive business details in voicemail or email broadcasts is a huge security risk and would not be considered a best practice for preventing insider attacks. The other options all seem like reasonable security measures. D is the clear answer here.
Hmm, I'm a bit unsure about this one. I know we need to prevent insider attacks, but I'm not sure if the other options are considered best practices or not. I'll have to think this through carefully.
This one seems pretty straightforward. I'm pretty confident that the answer is D - leaving business details over voicemail or email broadcast message would be a bad practice for preventing insider attacks.
Okay, let's see here. Disabling users from installing unauthorized software or accessing malicious websites - that seems like a good practice. Monitoring employee behavior and computer systems - also a good idea. Secure backup and disaster recovery processes - definitely important. But leaving business details over voicemail or email? That's just asking for trouble. I'm going with D on this one.
MPIO is definitely the way to go. It allows you to use multiple paths between the SAN and host, so if one path fails, the traffic can seamlessly failover to another. Solid strategy for eliminating that single point of failure.
Hmm, this is a tricky one. I'll need to think through the pros and cons of each option and how they align with the university's goals of easy student access and maintaining security.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Rana
3 months agoAleta
3 months agoTanesha
3 months agoMaryanne
4 months agoMerilyn
4 months agoPearline
4 months agoShawnna
4 months agoJosefa
4 months agoPete
5 months agoJoesph
5 months agoSimona
5 months agoCarin
5 months agoCecil
5 months agoPaola
5 months agoAshton
5 months ago