CompTIA Security+ Exam Prep

Category - Operations

Theresa is suspicious of an employee’s activity when they are logged-on to their computer. Theresa decides to monitor this employee for fraudulent activity, but plans to review the information later. What type of monitoring is Theresa using?
  1. Manual Watching
  2. Cameral Surveillance
  3. Keystroke Monitoring
  4. Access Control Snooping
Explanation
Answer: C - Often, when an organization is suspicious of an employee’s activities, they observe their behavior when they are logged-on to their computer through keystroke monitoring. The person using this type of monitoring can have the characters written to an audit log to be reviewed at a later time. This type of auditing is usually done only for special cases and only for a specific amount of time, because the amount of information captured can be overwhelming and unimportant.
Was this helpful? Upvote!
Login to contribute your own answer or details

Top questions

Related questions

Most popular on PracticeQuiz