PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following could the security administrator…

A security administrator has been tasked with improving the overall security posture related to desktop
machines on the network. An auditor has recently that several machines with confidential customer information
displayed in the screens are left unattended during the course of the day.
Which of the following could the security administrator implement to reduce the risk associated with the finding?

In order to implement a true separation of duties appro…

A bank requires tellers to get manager approval when a customer wants to open a new account. A recent audit
shows that there have been four cases in the previous year where tellers opened accounts without
management approval. The bank president thought separation of duties would prevent this from happening. In
order to implement a true separation of duties approach the bank could:

Which of the following can be implemented to reduce the…

A security administrator returning from a short vacation receives an account lock-out message when attempting
to log into the computer. After getting the account unlocked the security administrator immediately notices a
large amount of emails alerts pertaining to several different user accounts being locked out during the past
three days. The security administrator uses system logs to determine that the lock-outs were due to a brute
force attack on all accounts that has been previously logged into that machine.
Which of the following can be implemented to reduce the likelihood of this attack going undetected?

Which of the following would correct the deficiencies?

A security administrator has been assigned to review the security posture of the standard corporate system
image for virtual machines. The security administrator conducts a thorough review of the system logs,
installation procedures, and network configuration of the VM image. Upon reviewing the access logs and user
accounts, the security administrator determines that several accounts will not be used in production. Which of
the following would correct the deficiencies?

Which of the following security measures did the techni…

A technician is configuring a wireless guest network. After applying the most recent changes the technician
finds the new devices can no longer find the wireless network by name but existing devices are still able to use
the wireless network. Which of the following security measures did the technician MOST likely implement to
cause this Scenario?


Page 7 of 4,924« First...56789...203040...Last »