A company has recently had sensitive data stolen by a contractor who plugged a flash drive into a server. Which of the following is the BEST method to prevent future occurrences?
A. Disable any unused physical ports until needed
B. Implement a BIOS password on all the servers
C. Install chassis locks on all the servers
D. Restrict usage of flash drives in company policy
Ans: A. Disable any unused physical ports until needed
Computer Science & Information Technology
You might also like to view...
_________ allows an issuer to access regional and national networks that connect point of sale devices and bank teller machines worldwide.
A. EFT B. POS C. BTM D. ATF
Computer Science & Information Technology
A class-type attribute is best modeled by:
a. Breaking the class down into its fundamental-type components. b. An inheritance association. c. Encapsulating both classes in a third, larger class. d. A composition association.
Computer Science & Information Technology