A company has hired an external security consultant to conduct a thorough review of all aspects of corporate security. The company is particularly concerned about unauthorized access to its physical offices resulting in network compromises .
Which of the following should the consultant recommend be performed to evaluate potential risks?
A . The consultant should attempt to gain access to physical offices through social engineering and then attempt data exfiltration
B . The consultant should be granted access to all physical access control systems to review logs and evaluate the likelihood of the threat
C . The company should conduct internal audits of access logs and employee social media feeds to identify potential insider threats
D . The company should install a temporary CCTV system to detect unauthorized access to physical offices
Answer: A
Latest CAS-003 Dumps Valid Version with 509 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund