PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following methods has MOST likely been used?

A website administrator has received an alert from an application designed to check the integrity of the
company’s website. The alert indicated that the hash value for a particular MPEG file has changed. Upon
further investigation, the media appears to be the same as it was before the alert. Which of the following
methods has MOST likely been used?

Which of the following configuration commands should be…

A security administrator is tasked with implementing centralized management of all network devices. Network
administrators will be required to logon to network devices using their LDAP credentials. All command executed
by network administrators on network devices must fall within a preset list of authorized commands and must
be logged to a central facility. Which of the following configuration commands should be implemented to
enforce this requirement?

Which of the following should the administrator do to p…

A security administrator determined that users within the company are installing unapproved software.
Company policy dictates that only certain applications may be installed or ran on the user’s computers without
exception. Which of the following should the administrator do to prevent all unapproved software from running
on the user’s computer?

Which of the following password requirements will MOST …

While reviewing the security controls in place for a web-based application, a security controls assessor notices
that there are no password strength requirements in place. Because of this vulnerability, passwords might be
easily discovered using a brute force attack. Which of the following password requirements will MOST
effectively improve the security posture of the application against these attacks? (Choose two.)

The access control method that BEST satisfies these obj…

An organization is trying to decide which type of access control is most appropriate for the network. The current
access control approach is too complex and requires significant overhead. Management would like to simplify
the access control and provide user with the ability to determine what permissions should be applied to files,
document, and directories. The access control method that BEST satisfies these objectives is:

Which of the following portions of the company’s mobile…

A new hire wants to use a personally owned phone to access company resources. The new hire expresses
concern about what happens to the data on the phone when they leave the company. Which of the following
portions of the company’s mobile device management configuration would allow the company data to be
removed from the device without touching the new hire’s data?


Page 14 of 4,924« First...1213141516...203040...Last »