Prevent unauthorized data downloads and enforce corporate network use with a proxy server. Learn how to enhance your organization’s internet security.
Table of Contents
Question
A review of Internet security disclosed that users have individual user accounts with Internet service providers (ISPs) and use these accounts for downloading business data. The organization wants to ensure that only the corporate network is used. The organization should FIRST:
A. use a proxy server to filter out Internet sites that should not be accessed.
B. keep a manual log of Internet access.
C. include a statement in its security policy about Internet use.
D. monitor remote access activities.
Answer
A. use a proxy server to filter out Internet sites that should not be accessed.
Explanation
Implementing a proxy server allows the organization to control and monitor internet traffic, effectively restricting access to unauthorized sites and ensuring that business data is downloaded only through the corporate network.
Other options are still valuable but not the first step:
- Manual logging: Impractical and inefficient for comprehensive internet access control.
- Security policy statement: Sets expectations but doesn’t actively enforce restrictions.
- Monitoring remote access: Important for overall security but doesn’t specifically address the immediate issue of unauthorized data downloads.
Isaca Certified Information Systems Auditor CISA certification exam practice question and answer (Q&A) dump with detail explanation and reference available free, helpful to pass the Isaca Certified Information Systems Auditor CISA exam and earn Isaca Certified Information Systems Auditor CISA certification.