Which of the following would BEST address this desire?
An administrator has a network subnet dedicated to a group of users. Due to concerns regarding
data and network security, the administrator desires to provide network access for this group only.
Which of the following would BEST address this desire?
Which of the following is a security concern regarding users bringing personally-owned devices that they conne
Which of the following is a security concern regarding users bringing personally-owned devices
that they connect to the corporate network?
Which of the following will address this requirement?
Due to issues with building keys being duplicated and distributed, a security administrator wishes
to change to a different security control regarding a restricted area. The goal is to provide access
based upon facial recognition. Which of the following will address this requirement?
Which of the following would BEST address the administrator’s concerns?
A security administrator has concerns regarding employees saving data on company provided
mobile devices. Which of the following would BEST address the administrator’s concerns?
which of the following concepts?
Identifying residual risk is MOST important to which of the following concepts?
Which of the following security techniques is MOST appropriate to do this?
The information security technician wants to ensure security controls are deployed and functioning
as intended to be able to maintain an appropriate security posture. Which of the following security
techniques is MOST appropriate to do this?
Which of the following should the company configure to protect the servers from the user devices?
A small company can only afford to buy an all-in-one wireless router/switch. The company has 3
wireless BYOD users and 2 web servers without wireless access. Which of the following should
the company configure to protect the servers from the user devices? (Select TWO).
Which of the following poses the greatest risk with this integration?
Users can authenticate to a company’s web applications using their credentials from a popular
social media site. Which of the following poses the greatest risk with this integration?
Which of the following would BEST prove the success of the program?
A security team has established a security awareness program. Which of the following would
BEST prove the success of the program?
Which of the following achieves this goal?
A company needs to receive data that contains personally identifiable information. The company
requires both the transmission and data at rest to be encrypted. Which of the following achieves
this goal? (Select TWO).