Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

You take on the role of Security Officer for a mid - sized NHS hospital which has been the target of several successful cyberattacks. You

You take on the role of Security Officer for a mid-sized NHS hospital which has been the target of several successful cyberattacks. You discover that staff have access to information assets using Discretionary Access Control. All staff use internal file and printer sharing as part of their roles.
Which of the following actions should be your top priority?
Question 1 Answer
a.
Updating the security policy.
b.
Implementing an alternative access control approach.
c.
Conducting a risk assessment.
d.
Training staff on recognising social engineering.
e.
Filtering unused network ports.
Question 2
Answer saved
Marked out of 2.00
Flag question
Question text
What should normally follow the completion of a risk assessment?
Question 2 Answer
a.
Filter unused network ports.
b.
Shut down unnecessary services and administrator accounts.
c.
Update formal model.
d.
Update security policies.
e.
Implement staff training on social engineering.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Principles Of Database Systems With Internet And Java Applications

Authors: Greg Riccardi

1st Edition

020161247X, 978-0201612479

More Books

Students also viewed these Databases questions