Which of the following would need to be in place in case something happens to Pete?
Pete, the Chief Executive Officer (CEO) of a company, has increased his travel plans for the next
two years to improve business relations. Which of the following would need to be in place in case
something happens to Pete?
Which of the following can the security administrator implement to mitigate the risk of an online password att
A security administrator is concerned about the strength of user’s passwords. The company does
not want to implement a password complexity policy. Which of the following can the security
administrator implement to mitigate the risk of an online password attack against users with weak
passwords?
which of the following should be implemented?
In order to prevent and detect fraud, which of the following should be implemented?
Which of the following types of authentication is being utilized here?
A company has purchased an application that integrates into their enterprise user directory for
account authentication. Users are still prompted to type in their usernames and passwords. Which
of the following types of authentication is being utilized here?
Which of the following BEST represents the goal of a vulnerability assessment?
Which of the following BEST represents the goal of a vulnerability assessment?
Which of the following are Data Loss Prevention (DLP) strategies that address data in transit issues?
Which of the following are Data Loss Prevention (DLP) strategies that address data in transit
issues? (Select TWO).
Which of the following is MOST likely to be contained in the download?
A user casually browsing the Internet is redirected to a warez site where a number of pop-ups
appear. After clicking on a pop-up to complete a survey, a drive-by download occurs. Which of the
following is MOST likely to be contained in the download?
The administrator suspects that:
An administrator notices an unusual spike in network traffic from many sources. The administrator
suspects that:
Which of the following should the security administrator do in regards to the application?
A security administrator plans on replacing a critical business application in five years. Recently,
there was a security flaw discovered in the application that will cause the IT department to
manually re-enable user accounts each month at a cost of $2,000. Patching the application today
would cost $140,000 and take two months to implement. Which of the following should the security
administrator do in regards to the application?
Which of the following is the BEST solution to meet the business needs and protect confidential information?
A customer service department has a business need to send high volumes of confidential
information to customers electronically. All emails go through a DLP scanner. Which of the
following is the BEST solution to meet the business needs and protect confidential information?