ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 31 - ECSS discussion

Report
Export

Sarah was accessing confidential office files from a remote location via her personal computer connected to the public Internet. Accidentally, a malicious file was downloaded onto Sarah's computer without her knowledge. This download might be due to the free Internet access and the absence of network defense solutions.

Identify the Internet access policy demonstrated in the above scenario.

A.

Promiscuous policy

Answers
A.

Promiscuous policy

B.

Paranoid policy

Answers
B.

Paranoid policy

C.

Permissive policy

Answers
C.

Permissive policy

D.

Prudent policy

Answers
D.

Prudent policy

Suggested answer: C

Explanation:

In the given scenario, Sarah's personal computer connected to the public Internet allowed a malicious file to be downloaded without her knowledge. This situation reflects apermissive policy, where unrestricted access to the Internet is allowed, potentially leading to security risks.Reference: EC-Council Certified Security Specialist (E|CSS) documents and study guide .

asked 24/10/2024
Arno Rodenhuis
49 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first