To identify any such users, the security administrator could:

Based on information leaked to industry websites, business management is concerned that
unauthorized employees are accessing critical project information for a major, well-known new
product. To identify any such users, the security administrator could:

Based on information leaked to industry websites, business management is concerned that
unauthorized employees are accessing critical project information for a major, well-known new
product. To identify any such users, the security administrator could:

A.
Set up a honeypot and place false project documentation on an unsecure share.

B.
Block access to the project documentation using a firewall.

C.
Increase antivirus coverage of the project servers.

D.
Apply security updates and harden the OS on all project servers.



Leave a Reply 0

Your email address will not be published. Required fields are marked *