Which of the following actions will Mark take to prevent the use of key loggers in the company?

Mark works as a Security Officer for TechMart Inc. The company has a Windows-based network. He has bees assigned a project for ensuring the safety of the customer’s money and information, not to mention the company’s reputation. The company has gone through a security audit to ensure that it is in compliance with industry regulations and standards. Mark understands the request and has to do his due diligence for providing any information the regulators require as they are targeting potential security holes.
In this situation, his major concern is the physical security of his company’s system.
Which of the following actions will Mark take to prevent the use of key loggers in the company?

Mark works as a Security Officer for TechMart Inc. The company has a Windows-based network. He has bees assigned a project for ensuring the safety of the customer’s money and information, not to mention the company’s reputation. The company has gone through a security audit to ensure that it is in compliance with industry regulations and standards. Mark understands the request and has to do his due diligence for providing any information the regulators require as they are targeting potential security holes.
In this situation, his major concern is the physical security of his company’s system.
Which of the following actions will Mark take to prevent the use of key loggers in the company?

A.
Provide protection against a Distributed Denial of Services attack.

B.
Call a team member while behaving to be someone else for gaining access to sensitive information.

C.
Ensure that the terminals are locked and perform a regular inspection of the ports on the systems.

D.
Develop a social awareness of security threats within an organization.



Leave a Reply 0

Your email address will not be published. Required fields are marked *