PrepAway - Latest Free Exam Questions & Answers

Author: admin

Which of the following designs is MOST appropriate for …

A company is trying to decide how to manage hosts in a branch location connected via a slow WAN link. The
company desires to provide the same level of performance and functionality to the branch office as it provides
to the main campus. The company uses Active Directory for its directory service and host configuration
management. The branch location does not have a datacenter, and the physical security posture of the building
is weak. Which of the following designs is MOST appropriate for this scenario?

Which of the following meets these requirements?

A small company is developing a new Internet-facing web application. The security requirements are:
1. Users of the web application must be uniquely identified and authenticated.
2. Users of the web application will not be added to the company’s directory services.
3. Passwords must not be stored in the code.
Which of the following meets these requirements?

Which of the following components should be used to ach…

An educational institution would like to make computer labs available to remote students. The labs are used for
various IT networking, security, and programming courses. The requirements are:
1. Each lab must be on a separate network segment.
2. Labs must have access to the Internet, but not other lab networks.
3. Student devices must have network access, not simple access to hosts on the lab networks.
4. Students must have a private certificate installed before gaining access.
5. Servers must have a private certificate installed locally to provide assurance to the students.
6. All students must use the same VPN connection profile.
Which of the following components should be used to achieve the design in conjunction with directory services?

Which of the following process level solutions would ad…

Customers have recently reported incomplete purchase history and other anomalies while accessing their
account history on the web server farm. Upon investigation, it has been determined that there are version
mismatches of key e-commerce applications on the production web servers. The development team has direct
access to the production servers and is most likely the cause of the different release versions. Which of the
following process level solutions would address this problem?

What would be a key FIRST step for the data security te…

The DLP solution has been showing some unidentified encrypted data being sent using FTP to a remote
server. A vulnerability scan found a collection of Linux servers that are missing OS level patches. Upon further
investigation, a technician notices that there are a few unidentified processes running on a number of the
servers. What would be a key FIRST step for the data security team to undertake at this point?

Which of the following business processes and/or practi…

A facilities manager has observed varying electric use on the company’s metered service lines. The facility
management rarely interacts with the IT department unless new equipment is being delivered. However, the
facility manager thinks that there is a correlation between spikes in electric use and IT department activity.
Which of the following business processes and/or practices would provide better management of organizational
resources with the IT department’s needs? (Select TWO).

which of the following formal documents?

An IT manager is working with a project manager to implement a new ERP system capable of transacting data
between the new ERP system and the legacy system. As part of this process, both parties must agree to the
controls utilized to secure data connections between the two enterprise systems. This is commonly
documented in which of the following formal documents?


Page 288 of 461« First...102030...286287288289290...300310320...Last »