Question

In: Computer Science

Staff members are reporting an unusual number of device thefts associated with time out of the...

Staff members are reporting an unusual number of device thefts associated with time out of the office. Thefts increased soon after the company deployed a new social networking app.

Which of the following should the Chief Information Security Officer (CISO) recommend implementing? SELECT ONE

A. Automatic location check-ins

B. Geolocated presence privacy

C. Integrity controls

D. NAC checks to quarantine devices

PLEASE ALSO STATE THE CORRECT ANSWER AS WELL AS WHY THE OTHER ANSWERS ARE WRONG, THANKS

Solutions

Expert Solution

Answer)

D) NAC checks to quarantine devices.

NAC is called Network Access Control which can find the identification of the devices, this also results in checking the compliance with respect to the corporate security policy, This also depends on the result where the end device is allowed the access to that of the application as well as the corporate network.

When there is an end device that is not complying then it gets disconnected.

This has real-time and also helps in recognizing the clients and also it excludes any of the unknown devices from that of the network and makes a restriction to the accessibility of the devices.

A) Automatic location check-ins even when used will not be effective as it will only show the location where the check-in is made but the user will still be able to take away the device and make changes to disable the automatic check-in

B) Geolocated presence privacy, this seems to take the location of the device whereas it encounters the other risk, like tracking of the devices and manipulation of the devices locations and settings etc

C) It is not only about managing the integrity of the data only but also finding where the theft is made and what are the changes or data that are being breaches

Hope this answer helps.
If you find the answer useful please hit like.
Thanks


Related Solutions

List three strange/unusual/out-of-the ordinary factors associated with the Health Management, Inc.’s year end inventory-in-transit that should...
List three strange/unusual/out-of-the ordinary factors associated with the Health Management, Inc.’s year end inventory-in-transit that should have alerted the BDO Seidman auditors that maybe they should have identified the inventory-in-transit as a high-risk account that required extra audit procedures. List two auditing standards that Madoff Securities auditor David Friehling violated.
The following table shows the number of full-time faculty that WVU has on staff throughout the...
The following table shows the number of full-time faculty that WVU has on staff throughout the years. Year # of Faculty 2003 1230 2007 1300 2009 1440 2013 1470 2017 1530 2018 1630 (A) Find the equation of the regression line that represents the number of full-time faculty, F , as a function of x years since 2000. (round the regression coefficients to two decimal places) F(x) = (B) What is the correlation coefficient (r-value) for the regression model? (Round...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT