Which of the following would BEST assist in correcting this issue?
The help desk is experiencing a higher than normal amount of calls from users reporting slow
response from the application server. After analyzing the data from a packet capturing tool, the
head of the network engineering department determines that the issue is due, in part from the
increase of personnel recently hired to perform application development. Which of the following
would BEST assist in correcting this issue?
Which of the following should be the PRIMARY security considerations by the security managers at each organiza
Two organizations want to share sensitive data with one another from their IT systems to support
a mutual customer base. Both organizations currently have secure network and security policies
and procedures. Which of the following should be the PRIMARY security considerations by the
security managers at each organization prior to sharing information? (Select THREE)
Which of the following if implemented would violate company policy?
A company’s password and authentication policies prohibit the use of shared passwords and
transitive trust. Which of the following if implemented would violate company policy? (Select TWO)
Which of the following types of attacks is based on coordinating small slices of a task across multiple system
Which of the following types of attacks is based on coordinating small slices of a task across
multiple systems?
Which of the following would MOST likely help in achieving this goal?
A system security analyst wants to capture data flowing in and out of the enterprise. Which of the
following would MOST likely help in achieving this goal?
Which of the following should be used to automate this process?
The security manager reports that the process of revoking certificates authority is too slow and
should be automated. Which of the following should be used to automate this process?
Which of the following is MOST likely the cause for the user’s inability to complete the installation?
A user attempts to install a new and relatively unknown software program recommended by a
colleague. The user is unable to install the program, dispute having successfully installed other
programs previously. Which of the following is MOST likely the cause for the user’s inability to
complete the installation?
Which of the following technologies is the MOST appropriate storage?
A company needs to provide web-based access to shared data sets to mobile users, while
maintaining a standardized set of security controls. Which of the following technologies is the
MOST appropriate storage?
Which of the following is the MOST likely cause?
An employee’s mobile device associates with the company’s guest WiFi SSID, but then is unable
to retrieve email. The email settings appear to be correct. Which of the following is the MOST
likely cause?
Which of the following would BEST prevent this from occurring again?
A malicious individual used an unattended customer service kiosk in a busy store to change the
prices of several products. The alteration was not noticed until several days later and resulted in
the loss of several thousand dollars for the store. Which of the following would BEST prevent this
from occurring again?