PrepAway - Latest Free Exam Questions & Answers

Author: admin

Which of the following would provide the MOST thorough …

A firm’s Chief Executive Officer (CEO) is concerned that IT staff lacks the knowledge to identify complex
vulnerabilities that may exist in a payment system being internally developed. The payment system being
developed will be sold to a number of organizations and is in direct competition with another leading product.
The CEO highlighted that code base confidentiality is of critical importance to allow the company to exceed the
competition in terms of the product’s reliability, stability, and performance. Which of the following would provide
the MOST thorough testing and satisfy the CEO’s requirements?

Which of the following implementations would BEST meet …

A company that must comply with regulations is searching for a laptop encryption product to use for its 40,000
end points. The product must meet regulations but also be flexible enough to minimize overhead and support in
regards to password resets and lockouts. Which of the following implementations would BEST meet theneeds?

Which of the following is the MOST likely cause of the …

During a new desktop refresh, all hosts are hardened at the OS level before deployment to comply with policy.
Six months later, the company is audited for compliance to regulations. The audit discovers that 40 percent of
the desktops do not meet requirements. Which of the following is the MOST likely cause of the noncompliance?

Which of the following security controls will MOST like…

Wireless users are reporting issues with the company’s video conferencing and VoIP systems. The security
administrator notices internal DoS attacks from infected PCs on the network causing the VoIP system to drop
calls. The security administrator also notices that the SIP servers are unavailable during these attacks. Which
of the following security controls will MOST likely mitigate the VoIP DoS attacks on the network? (Select TWO).

Which of the following BEST provides insight into where…

The network administrator at an enterprise reported a large data leak. One compromised server was used to
aggregate data from several critical application servers and send it out to the Internet using HTTPS. Uponinvestigation, there have been no user logins over the previous week and the endpoint protection software is
not reporting any issues. Which of the following BEST provides insight into where the compromised server
collected the information?

Which of the following controls MUST be implemented to …

A bank is in the process of developing a new mobile application. The mobile client renders content and
communicates back to the company servers via REST/JSON calls. The bank wants to ensure that the
communication is stateless between the mobile application and the web services gateway. Which of the
following controls MUST be implemented to enable stateless communication?

Which of the following is the MOST likely cause of the …

After the install process, a software application executed an online activation process. After a few months, the
system experienced a hardware failure. A backup image of the system was restored on a newer revision of the
same brand and model device. After the restore, the specialized application no longer works. Which of the
following is the MOST likely cause of the problem?

Which of the following documents is MOST likely to cont…

A medical device manufacturer has decided to work with another international organization to develop the
software for a new robotic surgical platform to be introduced into hospitals within the next 12 months. In order toensure a competitor does not become aware, management at the medical device manufacturer has decided to
keep it secret until formal contracts are signed. Which of the following documents is MOST likely to contain a
description of the initial terms and arrangement and is not legally enforceable?

Which of the following security assessment methods are …

The following has been discovered in an internally developed application:
Error – Memory allocated but not freed:
char *myBuffer = malloc(BUFFER_SIZE);
if (myBuffer != NULL) {
*myBuffer = STRING_WELCOME_MESSAGE;
printf(“Welcome to: %s\\n”, myBuffer);
}
exit(0);
Which of the following security assessment methods are likely to reveal this security weakness? (Select TWO).


Page 294 of 461« First...102030...292293294295296...300310320...Last »