单项选择题
Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()
A.The cell phone should require a password after a set period of inactivity.
B.The cell phone should only be used for company related emails.
C.The cell phone data should be encrypted according to NIST standards.
D.The cell phone should have data connection abilities disabled.
点击查看答案
相关考题
-
单项选择题
IfauserattemptstogotoawebsiteandnoticestheURLhaschanged,whichofthefollowingattacksisMOSTlikelythecause?()
A.DLL injection
B.DDoS attack
C.DNS poisoning
D.ARP poisoning -
单项选择题
Whichofthefollowingrequiresanupdatetothebaselineafterinstallingnewsoftwareonamachine?()
A.Signature-based NIPS
B.Signature-based NIDS
C.Honeypot
D.Behavior-based HIDS -
单项选择题
WhichofthefollowingistheLEASTintrusivewayofcheckingtheenvironmentforknownsoftwareflaws?()
A.Protocol analyzer
B.Vulnerability scanner
C.Port scanner
D.Penetration test
