Enhance your Cisco Cyber Security knowledge. Study with flashcards and multiple choice questions, each question has hints and explanations. Get ready for your Cisco Cyber Security Exam with our comprehensive quiz!

Practice this question and more.


What is the appropriate countermeasure for unattended devices?

  1. Establish policies for passwords and threshold lockouts

  2. Implement data encryption techniques

  3. Use biometric authentication

  4. Conduct regular security audits

The correct answer is: Establish policies for passwords and threshold lockouts

Establishing policies for passwords and threshold lockouts is a highly effective countermeasure for unattended devices because it helps prevent unauthorized access when users are not actively using their workstations or devices. When a device is left unattended, it can become vulnerable to unauthorized users who might attempt to gain access to sensitive information. By implementing strict password policies, including requirements for complexity and regular changes, you make it significantly harder for unauthorized individuals to exploit an unattended device. Threshold lockouts are also important as they can temporarily disable access to the device after a specific number of failed login attempts. This feature serves as an additional layer of security, deterring attempts to access the device through brute-force attacks. While other measures like data encryption, biometric authentication, and regular security audits are important in their own right, they do not directly address the specific risk posed by unattended devices in the same way that password policies and lockout mechanisms do. Encryption protects data at rest or in transit, but does not prevent access on an unattended device once logged in. Biometric authentication requires user interaction which may not be applicable for devices left without supervision. Regular security audits are essential for overall security hygiene but do not provide immediate security for unattended devices. Therefore, focused policies around access control are crucial in