PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

which of the following is the problem when connecting to the website?

Recently clients are stating they can no longer access a secure banking site’s webpage. In
reviewing the clients’ web browser settings, the certificate chain is showing the following:
Certificate Chain:
X Digi Cert

Digi Cert High assurance C3
* banksite.com
Certificate Store:
Digi Cert – Others Certificate Store
Digi Cert High assurance C3 – Others Certificate Store
Based on the information provided, which of the following is the problem when connecting to the
website?

Which of the following security methods can provide protection against tour participants viewing sensitive inf

A company often processes sensitive data for the government. The company also processes a
large amount of commercial work and as such is often providing tours to potential customers that
take them into various workspaces. Which of the following security methods can provide protection
against tour participants viewing sensitive information at minimal cost?

Which of the following access control methods is MOST appropriate for preventing such occurrences in the fut

Joe is a helpdesk specialist. During a routine audit, a company discovered that his credentials
were used while he was on vacation. The investigation further confirmed that Joe still has his
badge and it was last used to exit the facility. Which of the following access control methods is

MOST appropriate for preventing such occurrences in the future?

Which of the following is the MOST appropriate control for the architect to focus onto ensure confidentiality

A security architect is designing an enterprise solution for the sales force of a corporation which
handles sensitive customer data. The solution must allow users to work from remote offices and
support traveling users. Which of the following is the MOST appropriate control for the architect to
focus onto ensure confidentiality of data stored on laptops?

which of the following documents would this concern MOST likely be addressed?

An organization is working with a cloud services provider to transition critical business applications
to a hybrid cloud environment. The organization retains sensitive customer data and wants to
ensure the provider has sufficient administrative and logical controls in place to protect its data. In
which of the following documents would this concern MOST likely be addressed?