A company has recently had sensitive data stolen by a contractor who plugged a flash drive into a server. Which of the following is the BEST method to prevent future occurrences?

A. Disable any unused physical ports until needed
B. Implement a BIOS password on all the servers
C. Install chassis locks on all the servers
D. Restrict usage of flash drives in company policy

Ans: A. Disable any unused physical ports until needed

Computer Science & Information Technology

You might also like to view...

_________ allows an issuer to access regional and national networks that connect point of sale devices and bank teller machines worldwide.

A. EFT B. POS C. BTM D. ATF

Computer Science & Information Technology

A class-type attribute is best modeled by:

a. Breaking the class down into its fundamental-type components. b. An inheritance association. c. Encapsulating both classes in a third, larger class. d. A composition association.

Computer Science & Information Technology