GSEC Exam Question 126
An attacker gained physical access to an internal computer to access company proprietary data. The facility is protected by a fingerprint biometric system that records both failed and successful entry attempts. No failures were logged during the time periods of the recent breach. The account used when the attacker entered the facility shortly before each incident belongs to an employee who was out of the area. With respect to the biometric entry system, which of the following actions will help mitigate unauthorized physical access to the facility?
GSEC Exam Question 127
An attacker gained physical access to an internal computer to access company proprietary data. The facility is protected by a fingerprint biometric system that records both failed and successful entry attempts.
No failures were logged during the time periods of the recent breach. The account used when the attacker entered the facility shortly before each incident belongs to an employee who was out of the area. With respect to the biometric entry system, which of the following actions will help mitigate unauthorized physical access to the facility?
No failures were logged during the time periods of the recent breach. The account used when the attacker entered the facility shortly before each incident belongs to an employee who was out of the area. With respect to the biometric entry system, which of the following actions will help mitigate unauthorized physical access to the facility?
GSEC Exam Question 128
You work as a Network Administrator for Net Soft Inc. You are designing a data backup plan for your
company's network. The backup policy of the company requires high security and easy recovery of data.
Which of the following options will you choose to accomplish this?
company's network. The backup policy of the company requires high security and easy recovery of data.
Which of the following options will you choose to accomplish this?
GSEC Exam Question 129
Which of the following protocols implements VPN using IPSec?
GSEC Exam Question 130
Which of the following focuses on identifying weaknesses within the current system?