Multiple Choice
A company has hired an external security consultant to conduct a thorough review of all aspects of corporate security. The company is particularly concerned about unauthorized access to its physical offices resulting in network compromises. Which of the following should the consultant recommend be performed to evaluate potential risks?
A) The consultant should attempt to gain access to physical offices through social engineering and then attempt data exfiltration
B) The consultant should be granted access to all physical access control systems to review logs and evaluate the likelihood of the threat
C) The company should conduct internal audits of access logs and employee social media feeds to identify potential insider threats
D) The company should install a temporary CCTV system to detect unauthorized access to physical offices
Correct Answer:

Verified
Correct Answer:
Verified
Q257: A threat advisory alert was just emailed
Q258: A Chief Information Security Officer (CISO) is
Q259: Following a recent network intrusion, a company
Q260: An organization, which handles large volumes of
Q261: A forensics analyst suspects that a breach
Q263: With which of the following departments should
Q264: A security analyst receives an email from
Q265: A security engineer is analyzing an application
Q266: A Chief Information Security Officer (CISO) has
Q267: A government organization operates and maintains several