Security Measures for Identifying Systems Involved in Security Incidents

Implementing a Standardized UNC

Prev Question Next Question

Question

The security manager reports that individual systems involved in policy or security violations or incidents cannot be located quickly.

The security manager notices the hostnames all appear to be randomly generated characters.

Which of the following would BEST assist the security manager identifying systems involved in security incidents?

A.

Enforce port security to require system authentication B.

Implement a standardized UNC C.

Label existing systems with current hostnames D.

Forward the DHCP logs to the security manager every day.

B.

Explanations

The security manager reports that individual systems involved in policy or security violations or incidents cannot be located quickly.

The security manager notices the hostnames all appear to be randomly generated characters.

Which of the following would BEST assist the security manager identifying systems involved in security incidents?

A.

Enforce port security to require system authentication

B.

Implement a standardized UNC

C.

Label existing systems with current hostnames

D.

Forward the DHCP logs to the security manager every day.

B.

The security manager's concern is that it is difficult to locate individual systems involved in security incidents because the hostnames appear to be randomly generated characters. Therefore, the BEST solution to assist in identifying the systems involved in security incidents would be to implement a standardized UNC (Universal Naming Convention).

A UNC is a naming system used in Microsoft Windows to identify network resources, such as computers, printers, and files. By implementing a standardized naming convention, each system on the network will have a unique and recognizable name. This will make it easier for the security manager to quickly locate individual systems involved in security incidents.

Enforcing port security to require system authentication may improve network security, but it will not necessarily assist in identifying systems involved in security incidents.

Labeling existing systems with current hostnames is a good practice but will not solve the problem if the hostnames are randomly generated characters.

Forwarding DHCP (Dynamic Host Configuration Protocol) logs to the security manager every day may provide some useful information, but it will not necessarily assist in identifying individual systems involved in security incidents.

Therefore, option B - Implement a standardized UNC - is the BEST solution to assist the security manager in identifying systems involved in security incidents.