PrepAway - Latest Free Exam Questions & Answers

Which of the following techniques enables a highly secured organization to assess security weaknesses in real

Which of the following techniques enables a highly secured organization to assess security weaknesses in
real time?

PrepAway - Latest Free Exam Questions & Answers

A.
Access control lists

B.
Continuous monitoring

C.
Video surveillance

D.
Baseline reporting

Explanation:
Continuous monitoring point toward the never-ending review of what resources a user actually accesses,
which is critical for preventing insider threats. Because the process is never-ending, assessments happen
in real time.
Incorrect Answers:
A: Access Control List (ACL) specifies which users are allowed or refused the different types of available
access based on the object type. It does not to assess security weaknesses in real time.
C: Video surveillance provides real time monitoring of physical threats.
D: A baseline report compares the current status of network systems in terms of security updates,
performance or other metrics to a predefined set of standards. It does not to assess security weaknesses
in real time.

Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, 6th Edition, Sybex, Indianapolis,
2014, pp. 154, 156, 372
http://en.wikipedia.org/wiki/IT_baseline_protection


Leave a Reply