The BEST course of action is to:

An organization has been experiencing a number of network-based security attacks that all appear
to originate internally. The BEST course of action is to:

An organization has been experiencing a number of network-based security attacks that all appear
to originate internally. The BEST course of action is to:

A.
require the use of strong passwords.

B.
assign static IP addresses.

C.
implement centralized logging software.

D.
install an intrusion detection system (IDS).

Explanation:

Installing an intrusion detection system (IDS) will allow the information security manager to better
pinpoint the source of the attack so that countermeasures may then be taken. An IDS is not limited
to detection of attacks originating externally. Proper placement of agents on the internal network
can be effectively used to detect an internally based attack. Requiring the use of strong passwords
will not be sufficiently effective against a network-based attack. Assigning IP addresses would not
be effective since these can be spoofed. Implementing centralized logging software will not
necessarily provide information on the source of the attack.



Leave a Reply 0

Your email address will not be published. Required fields are marked *