D
、
Searching personnel for USB storage devices at the facility's
entrance
ANSWER:B
NOTE:Software for centralized tracking and monitoring would allow a USB
usage policy to be applied to each user based on changing business
requirements, and would provide for monitoring and reporting exceptions to
management. A policy requiring dismissal may result in increased employee
attrition and business requirements would not be properly addressed.
Disabling ports would be complex to manage and might not allow for new
business needs. Searching of personnel for USB storage devices at the
entrance to a facility is not a practical solution since these devices are
small and could be easily hidden.
165
、
Which of the following is the initial step in creating a firewall
policy?
A
、
A cost-benefit analysis of methods for securing the applications
B
、
Identification of network applications to be externally accessed
C
、
Identification of vulnerabilities associated with network
applications to be externally accessed
D
、
Creation of an applications traffic matrix showing protection
methods
ANSWER:B
NOTE:Identification of the applications required across the network should
be identified first. After identification, depending on the physical
location of these applications in the network and the network model, the
person in charge will be able to understand the need for, and possible
methods of, controlling access to these applications. Identifying methods
to protect against identified vulnerabilities and their comparative
cost-benefit analysis is the third step. Having identified the
applications, the next step is to identify vulnerabilities (weaknesses)
associated with the network applications. The next step is to analyze the
application traffic and create a matrix showing how each type of traffic
will be protected.
166
、
Which of the following tasks should be performed FIRST when
preparing a disaster recovery plan?
A
、
Develop a recovery strategy.
B
、
Perform a business impact analysis.
C
、
Map software systems, hardware and network components.