Which of the following types of technologies will BEST address this scenario?
Joe, the Chief Technical Officer (CTO), is concerned about new malware being introduced into the
corporate network. He has tasked the security engineers to implement a technology that is
capable of alerting the team when unusual traffic is on the network. Which of the following types of
technologies will BEST address this scenario?
Which of the following can be used to mitigate risk if a mobile device is lost?
Which of the following can be used to mitigate risk if a mobile device is lost?
Which of the following BEST addresses this concern?
A security administrator wishes to increase the security of the wireless network. Which of the
following BEST addresses this concern?
Which of the following security concepts would Sara, the security administrator, use to mitigate the risk of d
Which of the following security concepts would Sara, the security administrator, use to mitigate the
risk of data loss?
Which of the following is an example of multifactor authentication?
Which of the following is an example of multifactor authentication?
Which of the following describes the purpose of an MOU?
Which of the following describes the purpose of an MOU?
Which of the following is this an example of?
After Matt, a user, enters his username and password at the login screen of a web enabled portal,
the following appears on his screen:
‘Please only use letters and numbers on these fields’
Which of the following is this an example of?
Which of the following risk mitigation strategies is MOST important to the security manager?
The system administrator has deployed updated security controls for the network to limit risk of
attack. The security manager is concerned that controls continue to function as intended to
maintain appropriate security posture. Which of the following risk mitigation strategies is MOST
important to the security manager?
Which of the following should the security administrator implement to limit web traffic based on country of or
Which of the following should the security administrator implement to limit web traffic based on
country of origin? (Select THREE).
Which of the following forensic procedures is involved?
The security manager received a report that an employee was involved in illegal activity and has
saved data to a workstation’s hard drive. During the investigation, local law enforcement’s criminal
division confiscates the hard drive as evidence. Which of the following forensic procedures is
involved?