Which of the following job responsibilities is the anal…
A security analyst performs the following activities: monitors security logs, installs surveillance cameras and
analyzes trend reports. Which of the following job responsibilities is the analyst performing? (Choose two.)
Which of the following is the MOST important activity t…
In order to maintain oversight of a third party service provider, the company is going to implement a
Governance, Risk, and Compliance (GRC) system. This system is promising to provide overall security posture
coverage. Which of the following is the MOST important activity that should be considered?
Which of the following is MOST likely affected?
Matt, a developer, recently attended a workshop on a new application. The developer installs the new
application on a production system to test the functionality. Which of the following is MOST likely affected?
Which of the following would be an appropriate mitigati…
A system security analyst using an enterprise monitoring tool notices an unknown internal host exfiltrating files
to several foreign IP addresses. Which of the following would be an appropriate mitigation technique?
Which of the following controls would allow a company t…
Which of the following controls would allow a company to reduce the exposure of sensitive systems from
unmanaged devices on internal networks?
Which of the following implementation steps would be ap…
Which of the following implementation steps would be appropriate for a public wireless hotspot?
Which of the following can be implemented if a security…
Which of the following can be implemented if a security administrator wants only certain devices connecting to
the wireless network?
Which of the following is the MOST likely reason the us…
A new virtual server was created for the marketing department. The server was installed on an existing host
machine. Users in the marketing department report that they are unable to connect to the server. Technicians
verify that the server has an IP address in the same VLAN as the marketing department users. Which of the
following is the MOST likely reason the users are unable to connect to the server?
Which of the following would BEST address this desire?
An administrator has a network subnet dedicated to a group of users. Due to concerns regarding data and
network security, the administrator desires to provide network access for this group only. Which of the following
would BEST address this desire?
How must user accounts for exiting employees be handled?
How must user accounts for exiting employees be handled?