Which of the following would BEST mitigate this issue?
Ann was reviewing her company’s event logs and observed several instances of GUEST
accessing the company print server, file server, and archive database. As she continued to
investigate, Ann noticed that it seemed to happen at random intervals throughout the day, but
mostly after the weekly automated patching and often logging in at the same time. Which of the
following would BEST mitigate this issue?
Which of the following is the BEST approach for implementation of the new application on the virtual server?
A new application needs to be deployed on a virtual server. The virtual server hosts a SQL server
that is used by several employees. Which of the following is the BEST approach for
implementation of the new application on the virtual server?
Which of the following could be utilized to provide protection from this type of attack?
A security administrator is notified that users attached to a particular switch are having intermittent
connectivity issues. Upon further research, the administrator finds evidence of an ARP spoofing
attack. Which of the following could be utilized to provide protection from this type of attack?
which of the following would be the BEST way to share the file with Joe?
Ann is a member of the Sales group. She needs to collaborate with Joe, a member of the IT
group, to edit a file. Currently, the file has the following permissions:
Ann: read/write
Sales Group: read
IT Group: no access
If a discretionary access control list is in place for the files owned by Ann, which of the following
would be the BEST way to share the file with Joe?
Which of the following would meet the requirements of this scenario?
A company would like to take electronic orders from a partner; however, they are concerned that a
non-authorized person may send an order. The legal department asks if there is a solution that
provides non-repudiation. Which of the following would meet the requirements of this scenario?
Which of the following is occurring?
The Chief Security Officer (CSO) is contacted by a first responder. The CSO assigns a handler.
Which of the following is occurring?
Which of the following controls can further secure the data in the central storage system?
An organization must implement controls to protect the confidentiality of its most sensitive data.
The company is currently using a central storage system and group based access control for its
sensitive information. Which of the following controls can further secure the data in the central
storage system?
Which of the following policies should be enforced to initiate a password change?
A network administrator, Joe, arrives at his new job to find that none of the users have changed
their network passwords since they were initially hired. Joe wants to have everyone change their
passwords immediately. Which of the following policies should be enforced to initiate a password
change?
Which of the following would BEST alleviate her concerns?
Ann, a security administrator at a call center, has been experiencing problems with users
intentionally installing unapproved and occasionally malicious software on their computers. Due to
the nature of their jobs, Ann cannot change their permissions. Which of the following would BEST
alleviate her concerns?
Which of the following should be used to authenticate and log connections from wireless users connecting with
Which of the following should be used to authenticate and log connections from wireless users
connecting with EAP-TLS?