A security administrator has been tasked with improving the overall security posture related to desktop machines on the network. An auditor has recently that several machines with confidential customer information displayed in the screens are left unattended during the course of the day.Which of the following could the security administrator implement to reduce the risk associated with the finding?
A. Implement a clean desk policy
B. Security training to prevent shoulder surfing
C. Enable group policy based screensaver timeouts
D. Install privacy screens on monitors
Answer: C. Enable group policy based screensaver timeouts
You might also like to view...
The ________ report in Project 2013 displays the work that has been done during the current week, the status of any remaining tasks that were due, and which tasks may be starting in the next week
A) Project Overview B) Work Overview C) Upcoming Tasks D) Burndown
Answer the following statements true (T) or false (F)
1. A class may implement only one interface. 2. The Select clause can be used to transform the values in a query result. 3. A query is a request to the database for the data that satisfies the specified criteria. 4. Database management systems enable you to access and store data without worrying about the external representation of databases. 5. A relational database model is a way of organizing data and considering relationships based on the physical structure of the data.