Which of the following mitigation techniques would addr…

Users are utilizing thumb drives to connect to USB ports on company workstations. A technician is concerned that sensitive files can be copied to the USB drives.
Which of the following mitigation techniques would address this concern? (Select TWO).

Users are utilizing thumb drives to connect to USB ports on company workstations. A technician is concerned that sensitive files can be copied to the USB drives.
Which of the following mitigation techniques would address this concern? (Select TWO).

A.
Disable the USB root hub within the OS.

B.
Install anti-virus software on the USB drives.

C.
Disable USB within the workstations BIOS.

D.
Apply the concept of least privilege to USB devices.

E.
Run spyware detection against all workstations.

Explanation:
A: The USB root hub can be disabled from within the operating system.
C: USB can also be configured and disabled in the system BIOS.
Incorrect Answers:
B: Anti-virus is installed on a device, not on removable storage. Anti-virus also does not prevent the unauthorized copying of data.
D: The principle of least privilege is used to ensure that users are only provided with the minimum privileges and permissions to resources that allow them to
perform their duties.
E: Spyware monitors a user’s activity and uses network protocols to reports it to a third party without the user’s knowledge. Detecting spyware does not prevent the
unauthorized copying of data.

Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, Sixth Edition, Sybex, Indianapolis, 2014, pp 153, 247-248, 300
Stewart, James Michael, CompTIA Security+ Review Guide, Sybex, Indianapolis, 2014, pp 82,



Leave a Reply 0

Your email address will not be published. Required fields are marked *