Which of the following actions will Mark take to prevent the use of key loggers in the company?

Mark works as a Security Officer for TechMart Inc. The company has a Windows-based network. He
has bees assigned a project for ensuring the safety of the customer’s money and information, not to
mention the company’s reputation. The company has gone through a security audit to ensure that it
is in compliance with industry regulations and standards. Mark understands the request and has to
do his due diligence for providing any information the regulators require as they are targeting
potential security holes. In this situation, his major concern is the physical security of his company’s
system. Which of the following actions will Mark take to prevent the use of key loggers in the
company?

Mark works as a Security Officer for TechMart Inc. The company has a Windows-based network. He
has bees assigned a project for ensuring the safety of the customer’s money and information, not to
mention the company’s reputation. The company has gone through a security audit to ensure that it
is in compliance with industry regulations and standards. Mark understands the request and has to
do his due diligence for providing any information the regulators require as they are targeting
potential security holes. In this situation, his major concern is the physical security of his company’s
system. Which of the following actions will Mark take to prevent the use of key loggers in the
company?

A.
Provide protection against a Distributed Denial of Services attack.

B.
Call a team member while behaving to be someone else for gaining access to sensitive
information.

C.
Ensure that the terminals are locked and perform a regular inspection of the ports on the systems.

D.
Develop a social awareness of security threats within an organization.

Explanation:
To prevent the use of key loggers in the organization, user is required to ensure that the terminals
are locked and to perform a regular inspection of the ports on the systems.

Answer A While stressing the Con? dentiality, Integrity, and Availability triangle in the training of
users, the process of providing availability is related to security training to ensure the protection
against a Distributed Denial of Services attack.



Leave a Reply 0

Your email address will not be published. Required fields are marked *