48. What should be part of a comprehensive network security plan? , w& a, {$ g5 F" `; {$ H9 i4 ]8 U
A. Allow users to develop their own approach to network security. 8 f* Q4 s5 D5 s* F! S i' R K
B. Physically secure network equipment from potential access by unauthorized individuals.
5 z1 J8 @; L: s! \, aC. Encourage users to use personal information in their passwords to minimize the likelihood of passwords being 0 T1 ^9 K2 _1 g$ {% X" ?" G
forgotten.
& E4 w4 q L& r7 \4 @9 V, ^+ mD. Delay deployment of software patches and updates until their effect on end-user equipment is well known and ; \/ g' O$ A Q: x1 w5 g
widely reported. 2 i1 c( w1 D+ D9 R3 ~
E. Minimize network overhead by deactivating automatic antivirus client updates. % l H& I2 o5 m4 `
Answer: B |
|