Which of the following controls support this goal?
After recovering from a data breach in which customer data was lost, the legal team meets with
the Chief Security Officer (CSO) to discuss ways to better protect the privacy of customer data.
Which of the following controls support this goal?
Which of the following protocol would be MOST appropriate?
A security engineer, Joe, has been asked to create a secure connection between his mail server
and the mail server of a business partner. Which of the following protocol would be MOST
appropriate?
Which of the following would be the BEST way to manage folder security?
A new network administrator is setting up a new file server for the company. Which of the following
would be the BEST way to manage folder security?
Which of the following protocols should be used instead of Telnet?
A recent vulnerability scan found that Telnet is enabled on all network devices. Which of the
following protocols should be used instead of Telnet?
which all of the employees’ devices are connected?
A network engineer is setting up a network for a company. There is a BYOD policy for the
employees so that they can connect their laptops and mobile devices.
Which of the following technologies should be employed to separate the administrative network
from the network in which all of the employees’ devices are connected?
Which of the following protocols is the BEST choice to use?
A network administrator is asked to send a large file containing PII to a business associate.
Which of the following protocols is the BEST choice to use?
Which of the following is the type of vulnerability described?
When performing the daily review of the system vulnerability scans of the network Joe, the
administrator, noticed several security related vulnerabilities with an assigned vulnerability
identification number. Joe researches the assigned vulnerability identification number from the
vendor website. Joe proceeds with applying the recommended solution for identified vulnerability.
Which of the following is the type of vulnerability described?
Which of the following describes this type of attack?
A malicious individual is attempting to write too much data to an application’s memory. Which of
the following describes this type of attack?
Which of the following would BEST fit her objective?
Ann, a security administrator, wishes to replace their RADIUS authentication with a more secure
protocol, which can utilize EAP. Which of the following would BEST fit her objective?
Which of the following would BEST alleviate Ann’s concerns with minimum disturbance of current functionality
Ann, a security administrator, has concerns regarding her company’s wireless network. The
network is open and available for visiting prospective clients in the conference room, but she
notices that many more devices are connecting to the network than should be.
Which of the following would BEST alleviate Ann’s concerns with minimum disturbance of current
functionality for clients?