Which of the following helps to establish an accurate t…
Which of the following helps to establish an accurate timeline for a network intrusion?
Which of the following, if properly implemented, would …
Which of the following, if properly implemented, would prevent users from accessing files that are unrelated to
their job duties? (Choose two.)
Which of the following technologies should this company…
An organization processes credit card transactions and is concerned that an employee may intentionally email
credit card numbers to external email addresses.
Which of the following technologies should this company consider?
Which of the following are examples of detective controls?
Which of the following are examples of detective controls?
Which of the following would be a customer concern if t…
A large bank has moved back office operations offshore to another country with lower wage costs in an attempt
to improve profit and productivity. Which of the following would be a customer concern if the offshore staff had
direct access to their data?
Which of the following documents outlines the technical…
Which of the following documents outlines the technical and security requirements of an agreement between
organizations?
Which of the following has been reported by the vulnera…
Although a vulnerability scan report shows no vulnerabilities have been discovered, a subsequent penetration
test reveals vulnerabilities on the network. Which of the following has been reported by the vulnerability scan?
Which of the following controls would BEST address this…
A business has set up a Customer Service kiosk within a shopping mall. The location will be staffed by an
employee using a laptop during the mall business hours, but there are still concerns regarding the physical
safety of the equipment while it is not in use. Which of the following controls would BEST address this security
concern?
Which of the following would provide the IT department …
A cafe provides laptops for Internet access to their customers. The cafe is located in the center corridor of a
busy shopping mall. The company has experienced several laptop thefts from the cafe during peak shopping
hours of the day. Corporate has asked that the IT department provide a solution to eliminate laptop theft. Which
of the following would provide the IT department with the BEST solution?
which of the following security controls?
A security manager requires fencing around the perimeter, and cipher locks on all entrances. The manager is
concerned with which of the following security controls?