ronr34 wrote:
Having trouble here.
I chose A and this is why: "not only through passwords and data encryption, but also through the physical control of company assets, such as laptops." This implies that passwords just aren't enough.
B only deals with research. What about collaborations and thing of that nature? it's too narrow for my taste....
Can anyone shed some light?
Hello ronr34.
I'm glad to help.
ANALYZE THE STIMULUS:Premise 1: To keep the competitive edge, information security must remain a high priority for our company.
Premise 2: The information stored on our networks could potentially be very valuable to competitors and foreign governments alike.
Premise 3: All employees must work to protect company information, not only through passwords and data encryption, but also through the physical control of company assets, such as laptops.
Question:If all of the above statements are true, which of the following statements can be most directly
inferred?
ANALYZE EACH ANSWER:A) Passwords are often inadequate forms of security, leading to the need for "physical control" over data storage objects such as laptops.
SHELL GAME but WRONG. A has a common fallacy called “
confusing cause and effect”.
The form is:A and B regularly occur together.
Conclusion: A causes B happen.
Keep in mind,
this logic is wrong because you don’t know A OR B leads to the occurring of the other. The only thing you know is A and B occur together. That’s It.
Back to the answer choice A:Problem here is words "
leading to". The stimulus only says employees must protect company information through
both passwords and physical control. It means two approaches must be applied
simultaneously That’s IT. You do
NOT know which approach is inadequate and which one leads to the occurring of the other.
If A were correct, the alternate A would be correct too. The alternate A is: "physical control" over data storage objects such as laptops is often inadequate form of security, leading to the need for passwords.
Hence, A can't be the correct answer.
B) Employees are not allowed to discuss their research with anyone other than fellow company employees.
Correct. Premise 1 says “To keep the competitive edge, information security must remain a high priority for our company”. We can infer that information needs to be kept internally. It means nobody outside the company should have information.
C) Company information carries a high monetary value, making the network attractive to hackers.
Wrong. Key word is “hackers”. The stimulus does not mention anything that the network is attractive to hackers. It only says that the network is attractive to competitors and foreign government alike.
D) The company is willing to go to great expense to protect its information.
Wrong. Nothing about “great expense”. We can’t infer that.
E) Employees must attend classes to learn to use the latest security software
Wrong. Nothing about “attend classes”. We can’t infer that.
Hope it helps.
TAKEAWAY:
Always be aware of the form
"confusing cause and effect". If you do not have enough information, do not assume A always leads to B.