A company storing data on a secure server wants to ensure it is legally able to dismiss and prosecute staff
who intentionally access the server via Telnet and illegally tamper with customer data. Which of the
following administrative controls should be implemented to BEST achieve this?

A.
Command shell restrictions
B.
Restricted interface
C.
Warning banners
D.
Session output pipe to /dev/null
Explanation:
Within Microsoft Windows, you have the ability to put signs (in the form of onscreen pop-up banners)
that appear before the login telling similar information—authorized access only, violators will be
prosecuted, and so forth. Such banners convey warnings or regulatory information to the user that they
must “accept” in order to use the machine or network. You need to make staff aware that they may
legally be prosecuted and a message is best given via a banner so that all staff using workstation will get
notification.
Incorrect Answers:
A: Command shell restrictions are not used to make everyone aware that they may be prosecuted. It is
rather used to implement the actual restriction.
B: A restricted interface will just hamper staff in their execution of their duties. Prosecution can only be
done when the staff is made aware of the prohibitions and accept the terms.
D: Configuring the session output pipe tp /dev/null is applying the restriction and not making staff aware
of the prohibitions.Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, 6th Edition, Sybex, Indianapolis,
2014, p. 374
WTF!!!!
0
0
(Slurp)
0
0