GSEC Exam Question 126

An attacker gained physical access to an internal computer to access company proprietary data. The facility is protected by a fingerprint biometric system that records both failed and successful entry attempts. No failures were logged during the time periods of the recent breach. The account used when the attacker entered the facility shortly before each incident belongs to an employee who was out of the area. With respect to the biometric entry system, which of the following actions will help mitigate unauthorized physical access to the facility?
  • GSEC Exam Question 127

    An attacker gained physical access to an internal computer to access company proprietary data. The facility is protected by a fingerprint biometric system that records both failed and successful entry attempts.
    No failures were logged during the time periods of the recent breach. The account used when the attacker entered the facility shortly before each incident belongs to an employee who was out of the area. With respect to the biometric entry system, which of the following actions will help mitigate unauthorized physical access to the facility?
  • GSEC Exam Question 128

    You work as a Network Administrator for Net Soft Inc. You are designing a data backup plan for your
    company's network. The backup policy of the company requires high security and easy recovery of data.
    Which of the following options will you choose to accomplish this?
  • GSEC Exam Question 129

    Which of the following protocols implements VPN using IPSec?
  • GSEC Exam Question 130

    Which of the following focuses on identifying weaknesses within the current system?