PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following choices BEST mitigates the range of risks associated with the continued use of removabl

Several departments in a corporation have a critical need for routinely moving data from one
system to another using removable storage devices. Senior management is concerned with data
loss and the introduction of malware on the network. Which of the following choices BEST
mitigates the range of risks associated with the continued use of removable storage devices?

Which of the following would be the BEST course of action for the consultant to recommend?

A retail store uses a wireless network for its employees to access inventory from anywhere in the
store. Due to concerns regarding the aging wireless network, the store manager has brought in a
consultant to harden the network. During the site survey, the consultant discovers that the network
was using WEP encryption. Which of the following would be the BEST course of action for the
consultant to recommend?

Which of the following procedures could have been implemented to aid the authorities in their investigation?

A company executive’s laptop was compromised, leading to a security breach. The laptop was
placed into storage by a junior system administrator and was subsequently wiped and re-imaged.
When it was determined that the authorities would need to be involved, there was little evidence to
present to the investigators. Which of the following procedures could have been implemented to
aid the authorities in their investigation?

Which of the following security controls is the BEST option to prevent auditors from accessing or modifying pa

An organization is implementing a password management application which requires that all local
administrator passwords be stored and automatically managed. Auditors will be responsible for
monitoring activities in the application by reviewing the logs. Which of the following security
controls is the BEST option to prevent auditors from accessing or modifying passwords in the
application?

Which of the following should the company have employees acknowledge before allowing them to access the corpor

A company has recently allowed employees to take advantage of BYOD by installing WAPs
throughout the corporate office. An employee, Joe, has recently begun to view inappropriate
material at work using his personal laptop. When confronted, Joe indicated that he was never told
that he could not view that type of material on his personal laptop. Which of the following should
the company have employees acknowledge before allowing them to access the corporate WLAN
with their personal devices?

which of the following could be implemented without increasing the amount of space required at the entrance?

A security administrator is tackling issues related to authenticating users at a remote site. There
have been a large number of security incidents that resulted from either tailgating or impersonation
of authorized users with valid credentials. The security administrator has been told to implement
multifactor authentication in order to control facility access. To secure access to the remote facility,
which of the following could be implemented without increasing the amount of space required at
the entrance?