PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following should the security administrator do to rectify this issue?

A security engineer is faced with competing requirements from the networking group and database
administrators. The database administrators would like ten application servers on the same subnet
for ease of administration, whereas the networking group would like to segment all applications
from one another. Which of the following should the security administrator do to rectify this issue?

Which of the following assessment techniques is BEST described in the analyst’s report?

A security analyst has been asked to perform a review of an organization’s software development
lifecycle. The analyst reports that the lifecycle does not contain a phase in which team members
evaluate and provide critical feedback of another developer’s code. Which of the following
assessment techniques is BEST described in the analyst’s report?

which of the following types of attacks?

An attacker wearing a building maintenance uniform approached a company’s receptionist asking
for access to a secure area. The receptionist asks for identification, a building access badge and
checks the company’s list approved maintenance personnel prior to granting physical access to

the secure are. The controls used by the receptionist are in place to prevent which of the following
types of attacks?

Which of the following has the administrator been tasked to perform?

A security administrator is tasked with conducting an assessment made to establish the baseline
security posture of the corporate IT infrastructure. The assessment must report actual flaws and
weaknesses in the infrastructure. Due to the expense of hiring outside consultants, the testing
must be performed using in-house or cheaply available resource. There cannot be a possibility of
any requirement being damaged in the test. Which of the following has the administrator been
tasked to perform?

Which of the following describes the type of attack the proxy has been legitimately programmed to perform?

A network administrator is attempting to troubleshoot an issue regarding certificates on a secure
website. During the troubleshooting process, the network administrator notices that the web
gateway proxy on the local network has signed all of the certificates on the local machine. Which
of the following describes the type of attack the proxy has been legitimately programmed to
perform?

Which of the following should be done to prevent this scenario from occurring again in the future?

A computer on a company network was infected with a zero-day exploit after an employee
accidently opened an email that contained malicious content. The employee recognized the email
as malicious and was attempting to delete it, but accidently opened it. Which of the following
should be done to prevent this scenario from occurring again in the future?