PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following is required to complete the certificate chain?

The firewall administrator is adding a new certificate for the company’s remote access solution.
The solution requires that the uploaded file contain the entire certificate chain for the certificate to
load properly. The administrator loads the company certificate and the root CA certificate into the
file. The file upload is rejected. Which of the following is required to complete the certificate chain?

Which of the following should the security administrator implement to ensure confidentiality of the data if th

The Chief Executive Officer (CEO) of a major defense contracting company a traveling overseas
for a conference. The CEO will be taking a laptop. Which of the following should the security
administrator implement to ensure confidentiality of the data if the laptop were to be stolen or lost
during the trip?

Which of the following should the organization implement in order to be compliant with the new policy?

A new security policy in an organization requires that all file transfers within the organization be
completed using applications that provide secure transfer. Currently, the organization uses FTP
and HTTP to transfer files. Which of the following should the organization implement in order to be
compliant with the new policy?

Which of the following risk management strategies BEST describes management’s response?

A product manager is concerned about continuing operations at a facility located in a region
undergoing significant political unrest. After consulting with senior management, a decision is
made to suspend operations at the facility until the situation stabilizes. Which of the following risk
management strategies BEST describes management’s response?

Which of the following capabilities would be MOST appropriate to consider implementing is response to the new

An information system owner has supplied a new requirement to the development team that calls
for increased non-repudiation within the application. After undergoing several audits, the owner
determined that current levels of non-repudiation were insufficient. Which of the following
capabilities would be MOST appropriate to consider implementing is response to the new
requirement?

Which of the following controls can be implemented to mitigate this type of inside threat?

Joe a website administrator believes he owns the intellectual property for a company invention and
has been replacing image files on the company’s public facing website in the DMZ. Joe is using
steganography to hide stolen data. Which of the following controls can be implemented to mitigate
this type of inside threat?