Your organization has a policy which prohibits USB storage devices from entering or leaving the building. However, they are authorized for use within the internal environment. Everyone entering the building is subject to package inspection, container x?ray and metal detectors. USB storage devices are checked out to users in library fashion when needed and are returned at the end of each day. The librarian properly keeps strict records for each device and verifies that every device is returned before the end of each day. After a long weekend, the librarian discovers that most of the storage devices are now missing.
What could have prevented this?
A. End user training
B. A storage safe
C. Using biometric or pin?code security based USB devices
D. Classification labels
Related Courses
Security+ Prep Course (SY0-401)
Security+ Certification Boot Camp (SY0-401)
Security+ Question of the Week (SY0-401) Series
- Security+ Question of the Week: Deploying a Firewall
- Security+ Question of the Week: Flood Guard
- Security+ Question of the Week: iSCSI
- Security+ Question of the Week: Wireless MAC Filtering
- Security+ Question of the Week: Quantitative Analysis
- Security+ Question of the Week: Contracts
- Security+ Question of the Week: System Clock
- Security+ Question of the Week: Security Breach Incident Response
- Security+ Question of the Week: Reduce Electrostatic Discharge
- Security+ Question of the Week: Planting Malware
- Security+ Question of the Week: Network Hardening
- Security+ Question of the Week: Fuzzing
- Security+ Question of the Week: Single Sign?On
- Security+ Question of the Week: Digital Envelope
- Security+ Question of the Week: Confining Communications to a Subnet
- Security+ Question of the Week: DoS Tool
- Security+ Question of the Week: Intranet Defense
- Security+ Question of the Week: War Driving
- Security+ Question of the Week: User Rights and Permissions Checks
- Security+ Question of the Week: Third Party Partnerships
- Security+ Question of the Week: Indicator of Integrity
- Security+ Question of the Week: Incident Response Procedure
- Security+ Question of the Week: Good Password Behavior
- Security+ Question of the Week: Tailgating
- Security+ Question of the Week: Differential Backup
- Security+ Question of the Week: Government and Military
- Security+ Question of the Week: Backdoor
- Security+ Question of the Week: Wrong Name or Address
- Security+ Question of the Week: Increase in Email Hoaxes
- Security+ Question of the Week: Suspicious Location-Based Messages
- Security+ Question of the Week: Session Hijack
- Security+ Question of the Week: Definition of a Threat
- Security+ Question of the Week: Dismiss Alarms
- Security+ Question of the Week: NoSQL vs. SQL Database
- Security+ Question of the Week: BYOD Compliance
- Security+ Question of the Week: Missing Storage Devices