Which of the following controls should be implemented to curtail this activity?
The help desk is receiving numerous password change alerts from users in the accounting
department. These alerts occur multiple times on the same day for each of the affected users’
accounts. Which of the following controls should be implemented to curtail this activity?
Which of the following would enhance the security of accessing data stored in the cloud?
Which of the following would enhance the security of accessing data stored in the cloud? (Select
TWO)
Which of the following is preventing the remote user from being able to access the workstation?
A remote user (User1) is unable to reach a newly provisioned corporate windows workstation. The
system administrator has been given the following log files from the VPN, corporate firewall and
workstation host.
Which of the following is preventing the remote user from being able to access the workstation?
when should this problem best be revisited?
During a data breach cleanup, it is discovered that not all of the sites involved have the necessary
data wiping tools. The necessary tools are quickly distributed to the required technicians, but when
should this problem best be revisited?
Which of the following will the audit team most l likely recommend during the audit out brief?
During a third-party audit, it is determined that a member of the firewall team can request,
approve, and implement a new rule-set on the firewall. Which of the following will the audit team
most l likely recommend during the audit out brief?
Which of the following will most likely fix the uploading issue for the users?
An administrator has configured a new Linux server with the FTP service. Upon verifying that the
service was configured correctly, the administrator has several users test the FTP service. Users
report that they are able to connect to the FTP service and download their personal files, however,
they cannot transfer new files to the server. Which of the following will most likely fix the uploading
issue for the users?
Which of the following is the appropriate network structure used to protect servers..?
Which of the following is the appropriate network structure used to protect servers and services
that must be provided to external clients without completely eliminating access for internal users?
Which of the following actions will help detect attacker attempts to further alter log files?
An administrator thinks the UNIX systems may be compromised, but a review of system log files
provides no useful information. After discussing the situation with the security team, the
administrator suspects that the attacker may be altering the log files and removing evidence of
intrusion activity. Which of the following actions will help detect attacker attempts to further alter
log files?
Which of the following controls reduces the risk created by malicious gaming customers attempting to circumven
A global gaming console manufacturer is launching a new gaming platform to its customers.
Which of the following controls reduces the risk created by malicious gaming customers
attempting to circumvent control by way of modifying consoles?
Which of the following access control methodologies would BEST mitigate this concern?
An audit has revealed that database administrators are also responsible for auditing database
changes and backup logs. Which of the following access control methodologies would BEST
mitigate this concern?