PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following would BEST alleviate the developer’s reports?

Ann, the network administrator, is receiving reports regarding a particular wireless network in the
building. The network was implemented for specific machines issued to the developer department,
but the developers are stating that they are having connection issues as well as slow bandwidth.
Reviewing the wireless router’s logs, she sees that devices not belonging to the developers are
connecting to the access point. Which of the following would BEST alleviate the developer’s
reports?

which of the following as a mitigation method against further attempts?

Joe analyzed the following log and determined the security team should implement which of the
following as a mitigation method against further attempts?

Host 192.168.1.123
[00:00:01]Successful Login: 015 192.168.1.123 : local
[00:00:03]Unsuccessful Login: 022 214.34.56.006 :RDP 192.168.1.124
[00:00:04]UnSuccessful Login: 010 214.34.56.006 :RDP 192.168.1.124
[00:00:07]UnSuccessful Login: 007 214.34.56.006 :RDP 192.168.1.124
[00:00:08]UnSuccessful Login: 003 214.34.56.006 :RDP 192.168.1.124

Which of the following services should be disabled to ensure secure communications?

A new web server has been provisioned at a third party hosting provider for processing credit card
transactions. The security administrator runs the netstat command on the server and notices that
ports 80, 443, and 3389 are in a ‘listening’ state. No other ports are open. Which of the following
services should be disabled to ensure secure communications?

Which of the following would meet all three goals?

A company hosts its public websites internally. The administrator would like to make some
changes to the architecture.
The three goals are:
(1) reduce the number of public IP addresses in use by the web servers
(2) drive all the web traffic through a central point of control
(3) mitigate automated attacks that are based on IP address scanning
Which of the following would meet all three goals?

Which of the following systems should be deployed?

Ann is the data owner of financial records for a company. She has requested that she have the
ability to assign read and write privileges to her folders. The network administrator is tasked with
setting up the initial access control system and handing Ann’s administrative capabilities. Which of
the following systems should be deployed?

Which of the following policies is being enforced?

The IT department noticed that there was a significant decrease in network performance during
the afternoon hours. The IT department performed analysis of the network and discovered this
was due to users accessing and downloading music and video streaming from social sites. The IT
department notified corporate of their findings and a memo was sent to all employees addressing
the misuse of company resources and requesting adherence to company policy. Which of the
following policies is being enforced?