Third, CISA Sample Questions, removing the cable from the USB jumper on the motherboard.
Advantages: It can make the function of USB port completely fail.
Disadvantages: It is lack of flexibility in management. When you re-enable the function of USB port in the future, CISA Sample Questions, you need to open the computer case and plug in the jumper cable.
Fourth, plugging the port with hot melt adhesive
Advantages: USB can be completely blocked
Disadvantages: USB port hardware will fail and cannot be used.There are also many enterprises, especially government agencies and security agencies, CISA Sample Questions, which often block the USB port of the computer with fillers such as hot melt adhesives. They are not allowed to be used by employees. Once blocked, no USB peripheral devices can be connected. CISA Sample Questions.
This is a destructive way of blocking. When the filler is injected into the USB port, CISA Sample Questions, the USB interface will be damaged and will never be used.
The fifth type, plugging in a dedicated adapter card or hardware lock
Advantages: When re-enabling, you do not need to remove the hardware, or reboot, CISA Sample Questions, the original computer operation will not be interrupted or changed.
Disadvantages: poor management flexibility
The sixth type, using the principle of employee groups, centralized control
Advantages: It is suitable for a large number of computer environments, and can be enforced in batches, unified settings Disadvantages: insufficient humanization and poor. CISA Sample Questions.
The seventh type, modifying the specific registry key of the computer Windows system
Advantages: simple setup
Disadvantages: limited for those who understand computer the operations management flexibility, CISA Sample Questions.