Which action best enhances security for a tablet used by staff to log events in a secure area?

Prepare for the EC-Council Certified Ethical Hacker (CEH) Exam. Use flashcards and multiple-choice questions with hints and explanations. Enhance your cyber security knowledge and get ready for the exam!

Multiple Choice

Which action best enhances security for a tablet used by staff to log events in a secure area?

Explanation:
Requiring a passcode or biometric unlock is an effective access control for a tablet used in a secure area. By ensuring that only authorized staff can unlock the device, you prevent unauthorized users from accessing the logging app and any sensitive data stored on the tablet. This protection at the point of use helps maintain the integrity of the logs, keeps sensitive information from being exposed if the device is lost or stolen, and preserves accountability because actions are tied to a verified user. Removing logging capability would defeat the purpose of the device, as the system needs to record events. Installing antivirus is helpful for malware defense but doesn’t stop someone from unlocking the device and tampering with data. Disabling network access could limit data exfiltration, but it also hinders legitimate operations like syncing logs and receiving updates, making it impractical as the primary security control.

Requiring a passcode or biometric unlock is an effective access control for a tablet used in a secure area. By ensuring that only authorized staff can unlock the device, you prevent unauthorized users from accessing the logging app and any sensitive data stored on the tablet. This protection at the point of use helps maintain the integrity of the logs, keeps sensitive information from being exposed if the device is lost or stolen, and preserves accountability because actions are tied to a verified user.

Removing logging capability would defeat the purpose of the device, as the system needs to record events. Installing antivirus is helpful for malware defense but doesn’t stop someone from unlocking the device and tampering with data. Disabling network access could limit data exfiltration, but it also hinders legitimate operations like syncing logs and receiving updates, making it impractical as the primary security control.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy