Several employees submit the same phishing email to the administrator. The administrator finds that the
links in the email are not being blocked by the company's security device. Which of the following might the
administrator do in the short term to prevent the emails from being received?
After copying a sensitive document from his desktop to a flash drive, Joe, a user, realizes that the
document is no longer encrypted. Which of the following can a security technician implement to ensure that
documents stored on Joe's desktop remain encrypted when moved to external media or other network
based storage?
Acme Corp has selectively outsourced proprietary business processes to ABC Services. Due to some
technical issues, ABC services wants to send some of Acme Corp's debug data to a third party vendor for
problem resolution. Which of the following MUST be considered prior to sending data to a third party?
An organization has introduced token-based authentication to system administrators due to risk of
password compromise. The tokens have a set of numbers that automatically change every 30 seconds.
Which of the following type of authentication mechanism is this?