Which of the following is an important implementation consideration when deploying a wireless network that use
Which of the following is an important implementation consideration when deploying a wireless
network that uses a shared password?
Which of the following additional policies should be implemented based on the tool’s output?
A security administrator is reviewing the below output from a password auditing tool:
P@ss.
@pW1.
S3cU4
Which of the following additional policies should be implemented based on the tool’s output?
Which of the following should the security administrator implement to mitigate password cracking attacks?
Several employee accounts appear to have been cracked by an attacker. Which of the following
should the security administrator implement to mitigate password cracking attacks? (Select TWO).
which of the following is a security control that should be in place?
Human Resources suspect an employee is accessing the employee salary database. The
administrator is asked to find out who it is. In order to complete this task, which of the following is a
security control that should be in place?
Which of the following is BEST suited when assigning user rights to individuals in the sales department?
A network administrator is configuring access control for the sales department which has high
employee turnover. Which of the following is BEST suited when assigning user rights to individuals
in the sales department?
Which of the following would be the BEST way to manage folder security?
A new network administrator is setting up a new file server for the company. Which of the following
would be the BEST way to manage folder security?
Which of the following methods should the system administrator implement?
A new intern was assigned to the system engineering department, which consists of the system
architect and system software developer’s teams. These two teams have separate privileges. The
intern requires privileges to view the system architectural drawings and comment on some
software development projects. Which of the following methods should the system administrator
implement?
Which of the following security controls would be implemented to restrict those departments?
A system administrator needs to ensure that certain departments have more restrictive controls to
their shared folders than other departments. Which of the following security controls would be
implemented to restrict those departments?
Which of the following practices reduces the management burden of access management?
Which of the following practices reduces the management burden of access management?
which of the following ways should the account be handled?
A supervisor in the human resources department has been given additional job duties in the
accounting department. Part of their new duties will be to check the daily balance sheet
calculations on spreadsheets that are restricted to the accounting group. In which of the following
ways should the account be handled?