managing risk Flashcards
The best way to know the vulnerabilities of an IT infrastructure is to run what?
Vulnerability scanner
When is a memorandum of understanding used?
When a legal contract is not appropriate
When working inside equipment, what should Jane do?
Wear a properly connected anti-ESD wrist strap.
What is the job of a first responder?
React to the notification of a computer crime.
Which of the following is used to provide hot standby capabilities using paired routers?
CARP
Which item should be found in a security policy?
Acceptable use policy
The placement of a rack should optimize what
Airflow
Users need training from the IT department to understand which of the following?
How to secure workstations with screen-locking and password-security techniques
During and after a change to the IT infrastructure, what must be done?
he changes must be documented.
A network administrator has decided to tighten company security after a recent data breach. The new scheme calls for a strong 10 character password, a special 4 digit pin code, and a one-time use dynamic token that is accessed via a smartphone application. Which of the following is being implemented?
Biometric security