Which of the following should be implemented?
A security administrator wants to implement a company-wide policy to empower data owners to manage and enforce access control rules on various resources.
Which of the following should be implemented?
which of the following documents would this concern MOS…
An organization is working with a cloud services provider to transition critical business applications to a hybrid cloud environment. The organization retains sensitive
customer data and wants to ensure the provider has sufficient administrative and logical controls in place to protect its data. In which of the following documents
would this concern MOST likely be addressed?
Which of the following would help reduce the amount of …
During a recent audit, it was discovered that several user accounts belonging to former employees were still active and had valid VPN permissions. Which of the
following would help reduce the amount of risk the organization incurs in this situation in the future?
which of the following security controls?
Having adequate lighting on the outside of a building is an example of which of the following security controls?
Which of the following BEST meets that requirement?
A security administrator needs a method to ensure that only employees can get onto the internal network when plugging into a network switch. Which of the
following BEST meets that requirement?
Which of the following is the MOST appropriate control …
A security architect is designing an enterprise solution for the sales force of a corporation which handles sensitive customer data. The solution must allow users to
work from remote offices and support traveling users. Which of the following is the MOST appropriate control for the architect to focus onto ensure confidentiality of
data stored on laptops?
Which of the following access control methods is MOST a…
Joe is a helpdesk specialist. During a routine audit, a company discovered that his credentials were used while he was on vacation. The investigation further
confirmed that Joe still has his badge and it was last used to exit the facility. Which of the following access control methods is MOST appropriate for preventing
such occurrences in the future?
Which of the following security methods can provide pro…
A company often processes sensitive data for the government. The company also processes a large amount of commercial work and as such is often providing
tours to potential customers that take them into various workspaces. Which of the following security methods can provide protection against tour participants
viewing sensitive information at minimal cost?
which of the following is the problem when connecting t…
Recently clients are stating they can no longer access a secure banking site’s webpage. In reviewing the clients’ web browser settings, the certificate chain is
showing the following:
Certificate Chain:
X Digi Cert
Digi Cert High assurance C3
* banksite.com
Certificate Store:
Digi Cert Others Certificate Store
Digi Cert High assurance C3 Others Certificate Store
Based on the information provided, which of the following is the problem when connecting to the website?
Which of the following describes this type of control?
An administrator is configuring a new Linux web server where each user account is confined to a cheroot jail.
Which of the following describes this type of control?