What two steps can the Control Room administrator take to address this threat?


A Control Room administrator has received an advisory from IT that security may be compromised for many Control Room systems. IT is concerned that there may be an attempt to load some harmful code into the Control Room.

What two steps can the Control Room administrator take to address this threat?(Choose two.)
A . Under Administration > Settings- Whitelisted file extensions > Disallow extensions which could be a virus (BAT files, etc,)
B . Put Control Room on a separate network, one not accessible by clients.
C . Check the Audit Log for user logins that occur at unusual hours into the Control Room, share this information with their user’s manager, and check the user’s uploads for threats
D . Ask IT to disable communication between the client and Control Room

Answer: A,C

Leave a Reply

Your email address will not be published.