You are the Security Administrator of Xtrinity, Inc. You write security policies and conduct
assessments to protect the company’s network. During one of your periodic checks to see how
well policy is being observed by the employees, you discover an employee has attached cell
phone 3G modem to his telephone line and workstation. He has used this cell phone 3G modem
to dial in to his workstation, thereby bypassing your firewall. A security breach has occurred as a
direct result of this activity. The employee explains that he used the modem because he had to
download software for a department project. How would you resolve this situation?
A.
Reconfigure the firewall
B.
Enforce the corporate security policy
C.
Install a network-based IDS
D.
Conduct a needs analysis
sale of the century slot machine
http://www.zkRCZC3urT.com/zkRCZC3urT