A tool that can be used to monitor network activity, such as when a user logs in
and out or sends an e-mail, is a: - ANSWER log analysis tool.
Brett is in charge of network security for a company with highly confidential
and sensitive data. He wants to use a physical access control technique that will
be the most reliable tool for controlling access to the network. Which of the
following should he use? - ANSWER Biometrics
Which of the following guidelines should you consider when testing systems? -
ANSWER You must review server logs to check user compliance to the
security policy.
Which step in security policy implementation ensures that security policy will
change as technology advances? - ANSWER Repeat the process and keep
current.
Which of the following is a security principle that allows you to protect your
network resources? - ANSWER Provide training for end users and IT workers.
Which of the following techniques prevents the buildup of excessive static
electricity or condensation that could damage networking equipment? -
ANSWER Humidity controls
What is the first step in implementing a security policy? - ANSWER Publish
the security policy.
Which technique can help to protect an FTP server? - ANSWER Use separate
FTP user accounts from those used to access the Web.
and out or sends an e-mail, is a: - ANSWER log analysis tool.
Brett is in charge of network security for a company with highly confidential
and sensitive data. He wants to use a physical access control technique that will
be the most reliable tool for controlling access to the network. Which of the
following should he use? - ANSWER Biometrics
Which of the following guidelines should you consider when testing systems? -
ANSWER You must review server logs to check user compliance to the
security policy.
Which step in security policy implementation ensures that security policy will
change as technology advances? - ANSWER Repeat the process and keep
current.
Which of the following is a security principle that allows you to protect your
network resources? - ANSWER Provide training for end users and IT workers.
Which of the following techniques prevents the buildup of excessive static
electricity or condensation that could damage networking equipment? -
ANSWER Humidity controls
What is the first step in implementing a security policy? - ANSWER Publish
the security policy.
Which technique can help to protect an FTP server? - ANSWER Use separate
FTP user accounts from those used to access the Web.