Which of teh following options could further improve th…
A datacenter has suffered repeated burglaries that lead to equipment theft and arson. In the past, the thieves have demonstrated a determination to bypass any
installed safeguards. After mantraps had been installed to prevent tailgating, the thieves crashed through the wall of the datacenter with a vehicle after normal
business hours. Which of teh following options could further improve the physical safety and security of the datacenter? (select TWO).
Which of the following could be used to determine who c…
The content of a document that is routinely used by several employees and contains confidential information has been changed. While investigating the issue, it is
discovered that payment information for all teh company’s clients has been removed from the document. Which of the following could be used to determine who
changed the information?
Which of the following would BEST help the company redu…
A company has noticed a recent increase in machines that have been exploited using vulnerabilities via third party software. Which of the following would BEST
help the company reduce the likelihood of vulnerabilities within the software creating future problems?
To initiate changes in teh process, the network adminis…
Based on a review of the existing access policies the network administrator determines that that changes are needed to meet current regulatory requirements of the
organization’s access control process. To initiate changes in teh process, the network administrator should FIRST:
The company has relocated to a:
An organization experienced a fire at its datacenter and was unable to operate at that location. The company moved to a location where HVAC and power are
available, but must supply and configure its own computing resources in order to provide services. The company has relocated to a:
Which of the following principles of authorization is b…
When implementing a new system, a systems administrator works with the information system owner to identify and document the responsibilities of various
positions within teh organization. Once responsibilities are identified, groups are created within the system to accommodate the various responsibilities of each
position type, with users being placed in these groups. Which of the following principles of authorization is being developed?
Which of the following should the software development …
A software development manager needs to create several different environments for application development, testing, and quality control. Controls are being put in
place to manage how software is moved into the production environment. Which of the following should the software development manager request be put in place
to implement the three new environments?
which of the following should be removed?
A company is hosting both sensitive and public information at a cloud provider. Prior to the company going out of business, the administrator will decommission all
virtual servers hosted in the cloud. When wiping the virtual hard drive, which of the following should be removed?
What is the reason for the accounting users suspicions?
Members of the accounting group save all of their work in a directory on a Linux server. The directory has the default permissions of rwxrwxr-x. The accounting
users suspect that a user in the Human Resources group is aware of the existence of a confidential file. What is the reason for the accounting users suspicions?
Which of the following will provide this information?
A penetration tester is attempting to determine the operating system of a remote host. Which of the following will provide this information?