which of the following is a security control that should be in place?
Human Resources suspects an employee is accessing the employee salary database. The
administrator is asked to find out who it is. In order to complete this task, which of the following is a
security control that should be in place?
Which of the following would benefit the MOST from deduplication?
Which of the following would benefit the MOST from deduplication?
Which of the following should Pete, a security manager, implement to reduce the risk of employees working in c
Which of the following should Pete, a security manager, implement to reduce the risk of
employees working in collusion to embezzle funds from their company?
which of the following types of transport?
FCoE uses which of the following types of transport?
Which of the following would provide the IT department with the BEST solution?
A cafe provides laptops for Internet access to their customers. The cafe is located in the center
corridor of a busy shopping mall. The company has experienced several laptop thefts from the
cafe during peek shopping hours of the day. Corporate has asked that the IT department provide a
solution to eliminate laptop theft. Which of the following would provide the IT department with the
BEST solution?
Which of the following will allow Pete, a security analyst, to trigger a security alert because of a tracking
Which of the following will allow Pete, a security analyst, to trigger a security alert because of a
tracking cookie?
Which of the following describes the function of an ISL?
Which of the following describes the function of an ISL?
Which of the following protocols allows for secure transfer of files?
Which of the following protocols allows for secure transfer of files? (Select TWO).
Which of the following would mitigate and secure the auditors finding?
An auditor’s report discovered several accounts with no activity for over 60 days. The accounts
were later identified as contractors’ accounts who would be returning in three months and would
need to resume the activities. Which of the following would mitigate and secure the auditors
finding?
Which of the following will be required to be able to read the data on an encrypted LTO-4 backup tape, if the
Which of the following will be required to be able to read the data on an encrypted LTO-4 backup
tape, if the tape has to be imported at the DR target site?