Which of the following network segmentation schemas would BEST meet this objective?
An organization has three divisions: Accounting, Sales, and Human Resources. Users in the
Accounting division require access to a server in the Sales division, but no users in the Human
Resources division should have access to resources in any other division, nor should any users in
the Sales division have access to resources in the Accounting division. Which of the following
network segmentation schemas would BEST meet this objective?
Which of the following would meet the objectives of the security policy?
An organization’s security policy states that users must authenticate using something you do.
Which of the following would meet the objectives of the security policy?
Which of the following protocols is MOST likely to be leveraged by users who need additional information about
Which of the following protocols is MOST likely to be leveraged by users who need additional
information about another user?
Which of the following could have aided the investigation?
An internal audit has detected that a number of archived tapes are missing from secured storage.
There was no recent need for restoration of data from the missing tapes. The location is monitored
by access control and CCTV systems. Review of the CCTV system indicates that it has not been
recording for three months. The access control system shows numerous valid entries into the
storage location during that time. The last audit was six months ago and the tapes were accounted
for at that time. Which of the following could have aided the investigation?
Which of the following should the engineer choose to meet these requirements?
A systems engineer has been presented with storage performance and redundancy requirements
for a new system to be built for the company. The storage solution must be designed to support
the highest performance and must also be able to support more than one drive failure. Which of
the following should the engineer choose to meet these requirements?
Which of the following is a system that will support the requirement on its own?
The security manager wants to unify the storage of credential, phone numbers, office numbers,
and address information into one system. Which of the following is a system that will support the
requirement on its own?
SQL databases in a three-tier environment?
Which of the following is a security advantage of using NoSQL vs. SQL databases in a three-tier
environment?
Which of the following is MOST important to the security manager?
In order to secure additional budget, a security manager wants to quantify the financial impact of a
one-time compromise. Which of the following is MOST important to the security manager?
Which of the following can be used to ensure the integrity of the logs after they are collected?
A company has just deployed a centralized event log storage system. Which of the following can
be used to ensure the integrity of the logs after they are collected?
Which of the following would be MOST effective for preventing this behavior?
The call center supervisor has reported that many employees have been playing preinstalled
games on company computers and this is reducing productivity. Which of the following would be
MOST effective for preventing this behavior?