You are an IT consultant and are visiting a new client's site to become familiar with their network. As you walk around their facility, you note the following:
• When you enter the facility, a receptionist greets you and directs you down the hallway to the office manager's cubicle. The receptionist uses a notebook system that is secured to her desk with a cable lock.
• The office manager informs you that the organization's servers are kept in a locked closet. Only she has the key to the closet. When you arrive on site, you will be required to get the key from her to access the closet.
• She informs you that server backups are configured to run each night. A rotation of external USB hard disks are used as the backup media.
• You notice the organization's network switch is kept in an empty cubicle adjacent to the office manager's workspace.
• You notice that a router/firewall/content filter UTM device has been implemented in the server closet to protect the internal network from external attacks.
Which security-related recommendations should you make to this client? (Select two.)
- Control access to the work area with locking doors and card readers.
- Use separate dedicated network perimeter security devices instead of an all-in-one device.
- Replace the USB hard disks used for server backups instead of an all-in-one device.
- Replace the key lock on the server closet with a card reader.
- Relocate the switch to the locked server closet.



Answer :

Other Questions