48. What should be part of a comprehensive network security plan? # _5 w5 q, y0 W* I/ f, k
A. Allow users to develop their own approach to network security.
7 g1 C/ Z5 p. X- p! vB. Physically secure network equipment from potential access by unauthorized individuals. , i9 s9 }1 Y& w- u. R
C. Encourage users to use personal information in their passwords to minimize the likelihood of passwords being - r" M( P6 N( w6 n, M
forgotten. ; J3 {7 P# t, @: s( {
D. Delay deployment of software patches and updates until their effect on end-user equipment is well known and . l7 W8 c5 T9 I* O1 r5 f
widely reported. - u2 B+ i9 z' C, J; ?* C
E. Minimize network overhead by deactivating automatic antivirus client updates. , Y# ^# [1 Q7 T7 y9 W+ r
Answer: B |
|