Answered step by step
Verified Expert Solution
Question
1 Approved Answer
You take on the role of Security Officer for a mid - sized NHS hospital which has been the target of several successful cyberattacks. You
You take on the role of Security Officer for a midsized NHS hospital which has been the target of several successful cyberattacks. You discover that staff have access to information assets using Discretionary Access Control. All staff use internal file and printer sharing as part of their roles.
Which of the following actions should be your top priority?
Question Answer
a
Updating the security policy.
b
Implementing an alternative access control approach.
c
Conducting a risk assessment.
d
Training staff on recognising social engineering.
e
Filtering unused network ports.
Question
Answer saved
Marked out of
Flag question
Question text
What should normally follow the completion of a risk assessment?
Question Answer
a
Filter unused network ports.
b
Shut down unnecessary services and administrator accounts.
c
Update formal model.
d
Update security policies.
e
Implement staff training on social engineering.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started